General

  • Target

    1084-56-0x00000000025C0000-0x00000000025F4000-memory.dmp

  • Size

    208KB

  • MD5

    3aafefdd3deb3d1f6248df0e5811bab6

  • SHA1

    1dca95368e31727b0cd374f4e06769ec868c8ed7

  • SHA256

    19e92910c66f6eede2edbacd7825965f0cee8d9367e27401e4972df6e62e0df5

  • SHA512

    131c928636e9a65afbaca17826630e3fc3472d4651e3b6b7eef00593e5695e264c94f1c472b532a0b6905a1346baab29597c82207ee9a54af6cb73629fc99a00

  • SSDEEP

    3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1084-56-0x00000000025C0000-0x00000000025F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections