General

  • Target

    1688-204-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    f5a45e82822b95c2269891336089f6ed

  • SHA1

    119836b53d5c4aabb6acaea16d4f08d6fcc1cbea

  • SHA256

    d096977832418f6f43217085f5967641edd171719f6cabe43580739ee4c05870

  • SHA512

    7fc41be6a25d90161d373e585eb52015af30923ad539f206980a8082cce9aabe251f674545e71df6fe526b97e573f1a6e374aaea2a6c7404d2ab88f4f5868bea

  • SSDEEP

    3072:RLllR+M737TNgcKkVYIorPkn+3HCbXIjECRSdLp1SnwemuKS:9llR+w37TNgcxIrcnfC0lp1SwTx

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.181:40264

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-204-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections