General

  • Target

    2028-3-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    c6797b4b3ffec47c847ed2ff60aa7b18

  • SHA1

    6bc200643ab62e98f91883c61f1e2038d787cc31

  • SHA256

    ca24311a2c3b6e9f9c206c3db749f337ad0817c207785104a61bea89be64fbd1

  • SHA512

    6638f1ba0645e11de22866d12a735e469d671e47424108a806b39c1fcfaeabbc30f2c488d52f48f2b641a34281188af8981e85d887930ab98a474331b1c3a4f9

  • SSDEEP

    6144:dijH2Cl7lNgcFAr4WXA00sp1SSGI/ONK:dijH2mNgcFArPQ0ZGI/ONK

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

194.49.94.40:21348

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-3-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections