General

  • Target

    3588-1-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    5a57e1d7dd79b5e679a81627c5524e72

  • SHA1

    2ad33b85bcdc22bee2f6d8d513d39adedc4dbc7c

  • SHA256

    7a9b4aaec2eb9cfa57ec0020306d02fcffff15e429ada80bfe5493fc67ec00bf

  • SHA512

    937e784ebcee29bfbb12c925e5b271f16ee3143677c5090dc5372823d57d21144324110ca1375cad4d4216dc2c0f8caeddd6a4eb55121b0cc21be894a2093ff9

  • SSDEEP

    6144:yqY6iFawPlsRPJlG1ZTyzAakcZqf7DI/L:yJawPwG1iAakcUzs/

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.85:45779

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3588-1-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections