General

  • Target

    3628-4-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    955a7455a134e1221ab33465dd60073a

  • SHA1

    23945b3f649adeec87b501714b7deb9c167373bb

  • SHA256

    4f9a9dbd1c2bfec0226b2a0e40ef90f0a8a7b75fce85e481dd1c480f79dfb7c3

  • SHA512

    8061158fcbb81c79c9e2c00e7bbac3a74dbe160349c155f098bdab9ed4da7c17974c10f28f69629c1067db914db417c90ca23c1cd7fdf886e9913ced057762b6

  • SSDEEP

    6144:1qY6i8wP8aDqWYK0eTABAngcZqf7DIPL:14wP4K0zAngcUzsP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

185.203.241.68:40901

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3628-4-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections