General

  • Target

    2400-3-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    c6560b496ffad829f84af4ed2ae8fce2

  • SHA1

    2f41928b1d546c927b7653332241b2c9b9ec4a58

  • SHA256

    ff2aa459396c2029849629fbf500de0dafdb70e24aad51e1b64918b1dc427dac

  • SHA512

    edcad661717293c83c5005fd6ff7625bd043889bcbe5389f0ab9b407dec28db89ef0c51eadf94e10bfd8b06ded6241e61a34245f366d0868d9998f8f593e04bc

  • SSDEEP

    3072:qjI663KkJL75NgcQcYJrDqvvNSwvKlv9HRRSdzO1SmweXDKSQ:qjIGCL75NgcQvrDqv9vKh0VO1SLc+

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

194.49.94.142:41292

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2400-3-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections