General

  • Target

    2440-67-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    284ec701256ebb8b32765e52c0829622

  • SHA1

    79bb7885f6f27b9eeee969767cc575c69f39d905

  • SHA256

    9dc9b04e1d80f6627cc0cc1c4fdca952163f7e28fc136b625b919c6d52e7fed7

  • SHA512

    a8c463b1baeb067a30f8fe5e9927c160ce21da570f459cf69b7ee5d491bdcf2f84284768f2f3b62c8a7ece04dfba4b5d74d94a36859c0b6f0e58f271cbc66bdd

  • SSDEEP

    3072:UxufaPH7PNgc1OEQGkr7Mbd5THA2Z0rgL0RSdNj1SLw030ilKS7:BMH7PNgcwUkr7Mbd5P00bj1SM20i4

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

45.15.156.187:23929

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2440-67-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections