General

  • Target

    3004-18-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    275eb23038e9365375aabb7a0baa8ef3

  • SHA1

    cbc12f2f3efefe186151f4e3040a2e90954bf78d

  • SHA256

    594f84ae8d8fdf749a46e58f645e7862877eabad58ea1886daa4a2fca7a0e40a

  • SHA512

    a05807afdefdc506a49e9d5f37a06aa78c0f1bef7171f353d8d7546f1e36a06b84635eedda3138845426f4d5020fa4dc0f39b42a9abf8421c0245b3a29ec728c

  • SSDEEP

    3072:8q6EgY6ifrUjjbmYwPhgsw4r+zR+TAZtAEiTIcZqf7D34leqiOLibBOc:3qY6i8wPvZyR+TAfAXIcZqf7DIvL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.50:33080

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3004-18-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections