General

  • Target

    3068-6-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    090237dac742313fc041d7ef42439661

  • SHA1

    ae393098ee01488f9e61f1aba79609b4ec250a1d

  • SHA256

    5822c50f93e8d6f6c142b904270d1acd7fc0cd50a7324b27ada6da260bf4a731

  • SHA512

    bc079962a7973f99c49b307792f877183058658c4b98bcb0a88df2ea9e0518df8126a9bedcd56650e5476558b8e183f1b647524d2fe7a98700e37aabaf9b1f8b

  • SSDEEP

    3072:Oq6EgY6i/rUj5mlowPbQaWkqWYK0eTAB9tASK9gcZqf7D34:1qY6i8wP8aDqWYK0eTABAngcZqf7DI

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

185.203.241.68:40901

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-6-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections