General

  • Target

    1452-56-0x0000000001FF0000-0x0000000002024000-memory.dmp

  • Size

    208KB

  • MD5

    6d07cf0e01456e231514f8e94b41d656

  • SHA1

    56b65eee90e368559ad0b25999e373683edf7596

  • SHA256

    51ebb744310806addd5b7e448feb452c51c5ec0be2afae476a466d20a931bc0e

  • SHA512

    8d9d0abc3c1701313fd6b44d21595d2dd8efd9d3e42155006f13cdb5fa73cbe1a543a1144246721634d3142bf5c11d888e977e8a4dfd6c152f403ddb2afaa639

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1452-56-0x0000000001FF0000-0x0000000002024000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections