General

  • Target

    1592-725-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    b4a78c916ffab310e5af65d63a78dbf9

  • SHA1

    2ac8a637ef2b020548ae692b03ed7f676d6c04af

  • SHA256

    2d3362a5ac8692e5f2c8e6536f89211e5261e3509275d961cecb4b5fd31ec532

  • SHA512

    b6629bdbd868e4adfc238243b415e5cca24f5b2e4a64562d6a899959f39286cc0dc8d3833ac847b9fb9f167dddfc3f9c1427a1f6b2c1452c5379b59a93342480

  • SSDEEP

    3072:JmmmiX7WNgcFaeorf8qZFW1rtCirNUGnRSdO61SFwq3ITTKS:omJX7WNgcFmrf8qZ8MGn0Q61SSiITO

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.142:41292

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-725-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections