General

  • Target

    952-57-0x00000000007B0000-0x00000000007E4000-memory.dmp

  • Size

    208KB

  • MD5

    b50d0f1e97d53a52b0857f0d2c747303

  • SHA1

    b3f86bb07887d177c2886b2572d5805a269b474d

  • SHA256

    4702965a504aa999ac7559b6065bcd208f125ffbc5f74ab582dd779e028110cc

  • SHA512

    0d561264f1a7363897708bdf45a9feebe080847875709d3d9491eacb44ea80df2515e13ac7a80e741e8a121d12fd9264e282cf095f7638fedc0c6a551a81e5f9

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 952-57-0x00000000007B0000-0x00000000007E4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections