General

  • Target

    3776-1-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    5c197ec8f6d145da29c06e957201d006

  • SHA1

    174349c66f9ca78110e65875d4af7c25c2bab6d8

  • SHA256

    45d428ab629d273fe2b4d75ec1015010f0539b3a0a45a98a2c627ba521b4eaa6

  • SHA512

    43e7d9025e8e21bf2ed0f54d5dc1e8d98a4a364fff65f52739cce101c398d48367b163b08340e5634a5f4ce6d183e70f05ec706317371ffbb3b9b7d01c84ec46

  • SSDEEP

    3072:4q6EgY6ifrUjjbmYwPhgsw4r+zR+TAZtAEiTIcZqf7D34leqiOLibBOc:LqY6i8wPvZyR+TAfAXIcZqf7DIvL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.50:33080

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3776-1-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections