General

  • Target

    2496-1-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    16c5cce4c67f814eda4f0c6916ec72dd

  • SHA1

    ca0592a095ab9b510a462fc0c2f9a012a7282e01

  • SHA256

    b4666cb2af8b28c27c837e00da9f4240535e4c1033c6106fb0504041cd132d96

  • SHA512

    c67e8553aacadd13728e5462c901d13dfad4d64e60f816e3302e2ea86235acd9264b9dee2263c2fb82bbbc6c19c6fe1e19e102879d08e28c28ab227ebd992929

  • SSDEEP

    3072:Rq6EgY6iHrUjgL/vywPvNhkQgvyiy6TATt0SiCscZqf7D341eqiOLibBOq:wqY6imwPfkxLy6TA508scZqf7DIfL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2496-1-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections