General

  • Target

    844-56-0x00000000033E0000-0x0000000003414000-memory.dmp

  • Size

    208KB

  • MD5

    ced3ec43ff2d91657ff794e7f9e02e58

  • SHA1

    5123afa97b48dd98ea40347fd55fcaee8389e1e3

  • SHA256

    4b8d45687ada3f8b0dca637c0479deb9bff281a08dbdffe06d4f7a320b7a6298

  • SHA512

    95237a83510fe8abb1d4040d3e3f773ba6e49845aa8bcadaf9b02c33b244603a4f2ba85642ef73910f38590fb512cc8ed39608e660f786a9577fdf1ae5228c3f

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 844-56-0x00000000033E0000-0x0000000003414000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections