General

  • Target

    1396-56-0x0000000001D70000-0x0000000001DA4000-memory.dmp

  • Size

    208KB

  • MD5

    40bc27f81d3772b99cf3f110df6f90b9

  • SHA1

    abc55e7a6479a02f6e2fa88d4ea8c2443a08ec61

  • SHA256

    ee85cf86afe0e67cbfa1b4e860741dd0228ff9f0a9703fafd2d226f5133b9e5d

  • SHA512

    7c927f761ef97d94a42a26c204f250c0b637c85f4bf0146284aaf2c6add61b63f0bd49e745c85cea610240e8af058f991a7a97da795cfa1bfd0daffd4490442c

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1396-56-0x0000000001D70000-0x0000000001DA4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections