General

  • Target

    672-56-0x0000000002140000-0x0000000002174000-memory.dmp

  • Size

    208KB

  • MD5

    bacd1da75f8cb75654162e399bd16fbb

  • SHA1

    7ad8c36d13c45520d02b7863b74006b256e39c19

  • SHA256

    fe7f08a9c94e9adb016ef641c58195d68153234f8e2ced0ff83eaa539a663f12

  • SHA512

    2274e1fa9e5c85b6e7dfa4dff17416994ce4665084fb4d739b507a51334bab00fa1b9eed6092abec8a93f69bf7cdbb0b12469285c7145ddcd7b8f30fc26de47c

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 672-56-0x0000000002140000-0x0000000002174000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections