General

  • Target

    2004-56-0x0000000003440000-0x0000000003474000-memory.dmp

  • Size

    208KB

  • MD5

    b35d0811b2cb3af228dd7b8167bd819d

  • SHA1

    cc3f4677116aca3f252db018c3403dda34834cae

  • SHA256

    8bba991e2175b6a072d9c2f4035b5a8875ac6b4500fb5c49da70931bb71c25a7

  • SHA512

    f81f297ad9e1d0cc90b9ad6c4deb390fed542a2738d699cde35d3e9f6b56cb11bdd90dd90f3a66209c1fe27caf922210d1d7c611fec58e4acd5a3eddfab05b25

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h01:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-56-0x0000000003440000-0x0000000003474000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections