General

  • Target

    2800-495-0x0000000000960000-0x00000000009B0000-memory.dmp

  • Size

    320KB

  • MD5

    1319a5a974cef3b4b2f32c74cc3bcf60

  • SHA1

    2faa45cf3e946a3a46f75e83445dc3c895524d1e

  • SHA256

    58f52e3cec66e34ee72b104909c3c86d6f83540f0f03b9f10e3aef398e92b026

  • SHA512

    b0b40c02d0b3803ee5a304b6e4320f76423b4f04c8d42e67d1ee3c76a803fd7c5ad760b8fe90e2e60ea220af774d46c38259521136532b9004cfe46a3d2861f5

  • SSDEEP

    3072:bEq8+MBK+A3ZUnVffW4tn5tBwcrmzZuJ1zNFcZqf7D34NeqiOLCbBOw:bvhMBK+ATCvBr6zZ6vFcZqf7DI3L

Malware Config

Extracted

Family

redline

Botnet

@logscloudyt_bot

C2

185.172.128.33:8970

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2800-495-0x0000000000960000-0x00000000009B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections