General

  • Target

    564-2-0x0000000000400000-0x0000000000450000-memory.dmp

  • Size

    320KB

  • MD5

    3c6cea1002962399549d8697e7c32719

  • SHA1

    b00ab7edc37b78eba4a2e7302e5fe73affca20dd

  • SHA256

    b7a872a520be8ddf243625fa1a471670de4e87f7357b41196c7c669a556644d9

  • SHA512

    f75fd2d3b651a5df97d899e0ba2626c2511ede377ecc5a5052ba4eda9a0ce83d85b9dd339710376aa1deb2fe4e45af30c1a29bd5d505eb08b4497f330d8064c5

  • SSDEEP

    3072:6qFFrqwIOGpcyce4fcn7VCRbeZQgCgdBhdggTZq1HgscZqf7D34FeqiOLCbBOC:5BIOGAUoRAxdbTZaRcZqf7DIPL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.115:40551

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 564-2-0x0000000000400000-0x0000000000450000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections