General

  • Target

    1320-56-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    86abe47ea31b266174e7a9543ac131da

  • SHA1

    2ec1009e4b0cebbf6919203f35639e9527859670

  • SHA256

    224f0e03fdaeab2dc9a4fce49431b5325ac469173c972c3ef10cdd80b38b393e

  • SHA512

    63064e4a8c2152ff3d44ffd2e7f7296171658786d1dc244be8d71adbe914d0cb241fda90bcb5988ef102ba3d9975f3229f0e8d2b26cd49ede0b0d38a71fac9b0

  • SSDEEP

    3072:TxqZWBKa3YVhiRn/b86Qep5r4hNjxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jO:lqZyRn/Q6z4h

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.137.6:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

Files

  • 1320-56-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections