General

  • Target

    4224-208-0x00000000004A0000-0x00000000004F4000-memory.dmp

  • Size

    336KB

  • MD5

    6342d93d2a16fe5d59643d66d511b0f6

  • SHA1

    4056acb3a0138edcc52e1ee65d1de1d5e2aa8cc2

  • SHA256

    da49bb1db770376e57be15d3abbbe636cff545d0ddcc1fddc6eff7f226a4527b

  • SHA512

    7e3fe111a97a04abee7c0a82a7a517280dc6c0e48045caa03f57b2ae6fbd5ccacfc756c8330f50e5bfcce42e7d1d192f6303717b4d61f23a297d63b2942a04d4

  • SSDEEP

    3072:dA056Rnz+rVnM2LsbfbujzJ8Kyvn9AuKoxic4wDMRqfjDv/YUeqiOL2bBOk:Ro0VBLsbfS5ylAsxiGMRqfjD4aL

Malware Config

Extracted

Family

redline

Botnet

@logscloudyt_bot

C2

185.172.128.33:8924

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4224-208-0x00000000004A0000-0x00000000004F4000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections