General

  • Target

    1648-67-0x0000000000080000-0x00000000000B2000-memory.dmp

  • Size

    200KB

  • MD5

    922bf1d80a7692c98ad066c06947d47a

  • SHA1

    beafea70d60af3cd73a6fc8892ecf93fa41e50ad

  • SHA256

    7df132ff77a089f8d1eef02e84742686c58b2b698960e64264af01f77ca69d6a

  • SHA512

    6359a9837dc54f8cabf91e7af3cbd38b24252b55fa8cbf24e79695fc0b7b6a9e07116520b963691e317bb21bb71dfffb85998c387923431fda7c7fc40c04c3e3

  • SSDEEP

    3072:txqZWjIaVECnCNB30u0wzWeme9nhrjxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0x:3qZNNB3XHz/nh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.137.6:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

Files

  • 1648-67-0x0000000000080000-0x00000000000B2000-memory.dmp
    .exe windows x86


    Headers

    Sections