General

  • Target

    4052-77-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    31c998b496e88254a130a28c68ff3d64

  • SHA1

    44b6132b64d48a7b46940d8d6aed23e88db5bfcc

  • SHA256

    7cbc5caae5b0a1fbafcf4bda8ce311be9297d78f87268cbd1741f6a6240388c0

  • SHA512

    a9a316b07589c1a35282266f251e9a16a72da160dda094ed872930502922c1f1fc7c0f39442f10c7cbb890daf7a61fe665898202474e8bbeb847edb04d8bf29c

  • SSDEEP

    6144:Dut2tJb9c2PBjABpGxOTIAXVMRqT6D4gL:yt2tQ2JjABp/FMsW8g

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

195.20.16.188:20749

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4052-77-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections