General

  • Target

    576-85-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    5c09bab92602c68a82a61cbc080296e6

  • SHA1

    9e9b6a0f0094849feb50d64d0597e99dd618fe76

  • SHA256

    1fa3e7d15525e95581e93f2848eee08729ab59504f07833096555808ec633102

  • SHA512

    ae76adcba9f2c551494b96253a3cb1ccdbb6798fe076d815219d92df4b0157d6a2b2180ba8753f73aa9d5b1057a72af3bc3b05b9742d55b788e37f388a898fdc

  • SSDEEP

    1536:EQ/uLHozOqlVZRGWViwr5KcIvwEyCSjeFTGqVUbuKyUFa2gQ/xI83wYko8e8hR:E+sIzx7IH5KqVsxPgQ/xI68e8hR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.32.215.165:9203

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

Files

  • 576-85-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections