General

  • Target

    2896-9-0x0000000000400000-0x0000000000450000-memory.dmp

  • Size

    320KB

  • MD5

    5f526b032913da59a2bdf56a34df1d37

  • SHA1

    b4180f5b7199436316c042294facf70236eb8c2c

  • SHA256

    6b1e9a374c6b66ca21a6b66fbe43150037dae589d538eef35c9d6e8ec7cbe93a

  • SHA512

    9fc3110fb515e74c0f9fde4124a072611f422411153a77cb1671074d16f30164354244dadebd50f2ecbf528bd7b224e8037a58a4c05cdf34d7628268a5bafd59

  • SSDEEP

    3072:TqK8kKqyZk88W7/0/YfQCPSDy0vsTZb+f/3cZqf7D341eqiOLCbBOW:uBkKqw6YfQCaDsTZa3cZqf7DIfL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.0:29587

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2896-9-0x0000000000400000-0x0000000000450000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections