General

  • Target

    1976-56-0x00000000021E0000-0x0000000002214000-memory.dmp

  • Size

    208KB

  • MD5

    69409528f6654797ab3db05e6e2236c4

  • SHA1

    d1329d140d14a45278b0dff55ad277604e4e4e16

  • SHA256

    3f0aeed40e379ac088b10568bffbb5b46a65c175ef9508180b26294df31796dc

  • SHA512

    db9d12cf78be6ae2f945b39963ce75967d6762a7e1ac2794aa1453164cb2e118ad856f13874703ce5ae5eec4cb26ac0d55e866cee79f95f0e17e478e5f1d3bbf

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1976-56-0x00000000021E0000-0x0000000002214000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections