General

  • Target

    2712-68-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    375e8e1b223fbd2c2cd23df32659908c

  • SHA1

    1add2d8d05f73b5cc41277e083b7ca26f5283b17

  • SHA256

    783c6d570ef7f959b221b43ea45641d00d1cc894739d5d349ec75c4cc668f0ed

  • SHA512

    660ba9f4f2b2e210c83b54dbdb4f8ba8fcb664bba1da299d9b44e5e8cb78f5cfd58a3905b6183ffce2d39f594125c87da84964cfeb1e117015214ab4d8efcda1

  • SSDEEP

    3072:bxufaPH7PNgc1OEQGkr7Mbd5THA2Z0rgL0RSdNj1SLw030ilKS7:IMH7PNgcwUkr7Mbd5P00bj1SM20i4

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

45.15.156.187:23929

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2712-68-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections