General

  • Target

    660-347-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    843e45e91361da29de1c5e5b6171e3c2

  • SHA1

    ae563157516c918e8e7f1da2024c4fd2f946b2db

  • SHA256

    993d2d0f7d319e672bff1c556f9d0bdcc10d9a7cfdc9d8e8606f99c978028435

  • SHA512

    49231c92c816a4a26a8a4a0a8e99e285cfbc00fff042564afbdb444bb1d587cc3765daa1eeb61402097f0cbf0e9a0930a9743764256daf09821542610c8e0163

  • SSDEEP

    3072:QTrv7Zn47I0TCcc0O95bb2uME0eCbbX9Xp9buoJ:WvS7I0TCccUuME0J9Xp9bD

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 660-347-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections