General

  • Target

    4708-3-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    f85044e85af36919c5cdb8f9a9bf7242

  • SHA1

    c75aa2d72955976fa654043a1d9208bfc3ef8df8

  • SHA256

    9f1c372aa39af24cd576ff848817a2cf6eb5c30f9e07f655a2257912b8dd31bc

  • SHA512

    548cbbe00a7b617013a00fc34ae30a6b093aa8fd4eee2fba390ad2beaab3468b8a7084a3d3e812621f8a3214b0dbd09ca25e3c81cf9a960c13e49aee9d941254

  • SSDEEP

    3072:oq6EgY6iHrUj1DeewPMNWd2yqTArtAOK2IcZqf7D34teqiOLibBOc:7qY6iwwP5cyqTAhA0IcZqf7DIXL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

45.91.202.63:25415

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4708-3-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections