General

  • Target

    1284-67-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    b0379cbb9bb979ba87f7c408657f8d1a

  • SHA1

    b44976eae31838bb8f53c08b9b0516fb92b44bee

  • SHA256

    a82732b71779c41df6b105ffe98f385b53d6bd64d783d6cb3caac9be3270d783

  • SHA512

    bdb7fb5255cb6a8bc21e1a8c7f76c11c1f72ee520f75742c2a16138a0c7e605dd5a69c2d96870bc97d9ea8fcc6c7f9d968243f4585c6d8fc09bf8f2ea79ffa43

  • SSDEEP

    3072:xxqZWFeaD3go+64PMkRq4seD59AhKvxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0X:jqZyb4PM8h3Ah

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.207.166:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

Files

  • 1284-67-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections