General

  • Target

    1440-82-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    251e97ab7de4d064b54a62551d9b4ca3

  • SHA1

    3acd8a4ac9c9a46d1b1a4ddadf2413830f19d9f0

  • SHA256

    b209ca98f6a68b2112edf5e5a02a255f3d065d86201860af61b83c6384893110

  • SHA512

    7b2fe743ef3ad670d856babce289a3c2ffa7cb0ddb11375c66bd3699134921abdf450763861fab781e280f7756160e3a12574cec097587bce7f4ea4b4bf74527

  • SSDEEP

    3072:cxqZWhiaXEatPBngNke/59DhHexNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuwI:yqZkBnwLDh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.210.161.21:36108

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

Files

  • 1440-82-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections