General

  • Target

    3020-148-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    ac795b208fcbe7ec159df89cd15b51df

  • SHA1

    f63f872d358d548710f060aba53b1d37272ab74f

  • SHA256

    c203fec825d84837c2f723041b9de1b1c41ea14f590eed3fb6642a848dc02548

  • SHA512

    bd2d55099f99886e39e53821f3755ffd84022de0643c415fea8647472dcc92de999966ebdf184338f6700573887bb04bfc2a81faaef3d22594c364a9df6a5b75

  • SSDEEP

    3072:RLllR+M737TNgcKkVYIorPkn+3HCbXIjECRSdLp1SnwemuKSD:9llR+w37TNgcxIrcnfC0lp1SwTx

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.181:40264

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-148-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections