General

  • Target

    1336560x00000000020A00000.dmp

  • Size

    208KB

  • MD5

    3776d4b40861e05bfe03073bc096bb95

  • SHA1

    689d1324bc2d6eba1c6ea7f71bcc4942f63ff464

  • SHA256

    c0ddfb0121b9a1bbbb109d19c0e62e8da35dcc5b53ebec04c1ba85698b75ded9

  • SHA512

    c9d5ddb47533998bb4c638e65e0399c3fcfab1fee2075077d861d040188a88b2d7463112da9a7dded46ba6466a139daf342f7c57a5b2b1a498bad9d69a96e3e3

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1336560x00000000020A00000.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections