General

  • Target

    2008-58-0x00000000007E0000-0x0000000000814000-memory.dmp

  • Size

    208KB

  • MD5

    3bcf2b61009f9a946f80d58e69f2b40b

  • SHA1

    54f0c83c650a4571ecab21970c7d68a9001d53ec

  • SHA256

    c4ddaac3a3405e211068c72386a997c0ec6084a074acf80e0355c4c28e984d08

  • SHA512

    ffc4a7042c08b1cf6bc3cb8b0bff1435812a91b4d7c8e45a3c392479cd1c4cc22b18cb6bef03a7dd382f8955ca3f32eb85891f501da1181fa9cfe99205bba315

  • SSDEEP

    3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2008-58-0x00000000007E0000-0x0000000000814000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections