General

  • Target

    2496-708-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    dd1706db17ef655452db3cf27e5e0432

  • SHA1

    aba1be3faec987b75fd3aeb84971b19aa704d61f

  • SHA256

    4fec0befec7942ab2407e3a92f6a988de9cf579464fd4ff4248436c863d56f77

  • SHA512

    f8a61d46f308746d22ba59ec7045223488f847b59eff0772addd46432e24f18bd79940fb415280c835a18524eb0cb8a55a5948069dbdc7d72918f237f3cb0151

  • SSDEEP

    3072:JmmmiX7WNgcFaeorf8qZFW1rtCirNUGnRSdO61SFwq3ITTKSj:omJX7WNgcFmrf8qZ8MGn0Q61SSiITO

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.142:41292

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2496-708-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections