General

  • Target

    2200-5-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    d8fffe98b896a96f37376e481d64d9ea

  • SHA1

    b1f9f9d1a3886599fbdc7c641e9ce62ad0f008fe

  • SHA256

    b37cbe268afdc59778ee3cc2601fe3cfad5c596ff382fcc63a62b81d0ac06c29

  • SHA512

    aa3ebf73f816e0b61fea3eb5bfb28f1f0c7251dc1e1316b2d54dfc88ddbb4de38adec3cb60e4d25d73322481e4283ca7a51127b571e1e11d17544d58e2bf3441

  • SSDEEP

    6144:rrzkuv7SNgcD8rPEsCxG90EY1SGSI11AK:rPsNgcD8r/CSI11AK

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

194.49.94.181:40264

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2200-5-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections