General

  • Target

    2224-56-0x0000000001D00000-0x0000000001D34000-memory.dmp

  • Size

    208KB

  • MD5

    97ef2b3c694d99fe70085a41aa614723

  • SHA1

    b33c9b9ab906b36a9378d9bacbe1a9232dbc6774

  • SHA256

    19ca73bffd9e73badabd4f46f5fc0f1d9f0c56d48fc024e32b23b9f3dfefedea

  • SHA512

    7e073aa318cab3d1d875fc66cdcd4fce1ac21008d880a614168f5102f4e2aba080047d21a9d0f4b0df9a45ffa6dfcb64c57f5208e6f2ec083ae919619814bdc2

  • SSDEEP

    3072:j8vs69J56kC75iEd5b2B6lZsU8BOl2a/N4+khzu68e8hR:ovs6kkC7zBcjBOl2CNgi6

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

147.135.165.22:17748

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2224-56-0x0000000001D00000-0x0000000001D34000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections