General

  • Target

    1100-56-0x0000000000490000-0x00000000004C4000-memory.dmp

  • Size

    208KB

  • MD5

    dec0e3f1aad8ba7c64738897f9d7b4b0

  • SHA1

    e547b939edda6867c62630a5ff29d84548d7d72f

  • SHA256

    bc66682c01c508a488ecfd336ecde0416e3b8af1afc22071349e8636e6932f8b

  • SHA512

    0150bd35001cdab6e518cd0a92b8807e3b4b5ab379bd4f4e787f2c73c56ab1709a5ffb93f8bc627d61d61dce8965d2383dcc5e6cc82ad8f2e9e0e5bf6113532c

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1100-56-0x0000000000490000-0x00000000004C4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections