General

  • Target

    1420-2-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    4b9265f8d36448a74c5534ac7dc6ed31

  • SHA1

    c45d07ed0bcbdc52d96273518e40f0feb76fa366

  • SHA256

    db46200037d24326a24cb6c36f58b1b30c15fe210e0952aad36032090e80ddfd

  • SHA512

    3293d1a1dca3caf5ef0fb102030c37b8336955ab33b5ba341e32645d645761bacdc0bbe8ba4a032529493b2b90edfb45213e064858255993acd3f085c3309c3a

  • SSDEEP

    3072:qjI663KkJL75NgcQcYJrDqvvNSwvKlv9HRRSdzO1SmweXDKS:qjIGCL75NgcQvrDqv9vKh0VO1SLc+

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

194.49.94.142:41292

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1420-2-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections