General

  • Target

    1412570x00000000033D00000.dmp

  • Size

    208KB

  • MD5

    99364d9034218fb24369f2677270370f

  • SHA1

    bf02a206214f24d65a5c6cc214bca94d24b9f132

  • SHA256

    44d3b28cc1cc0ef93c0a7672d8a7b9155972d1ec095c8ad3e25a1e3dd11ac915

  • SHA512

    2196749e1cd2a01611cbcab4b72aacf5b22d46551d4b903a558df2f17a600fa2b7536bce6073167b011ec1b8987f2c42cd11e483bf7b191f1e836a6a43415ba7

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1412570x00000000033D00000.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections