General

  • Target

    2760-185-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    23ed8c37beb1dee8fd3e27dad046353f

  • SHA1

    ed670b26900045d740cd98732ef8fdf9b5cc825c

  • SHA256

    fdbc90350511f59d35872e98ff142938f27cb6c4f4d011c787c9f7907dcf2ca3

  • SHA512

    6f9cf295964c8e2bbed8ebc0d246ef9a138b2128b8b6dd047fc74b4909773d8b765653163571efac31d8bd272e011461632ab9cddc3bcc228e671069ba8d9d2c

  • SSDEEP

    3072:3LllR+M737TNgcKkVYIorPkn+3HCbXIjECRSdLp1SnwemuKSD:7llR+w37TNgcxIrcnfC0lp1SwTx

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.181:40264

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2760-185-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections