General

  • Target

    2072-62-0x0000000002C00000-0x0000000002C34000-memory.dmp

  • Size

    208KB

  • MD5

    7b39d6f1f0c57d6344e35d760db90740

  • SHA1

    c174c3ded40f17454630c0d8d7387f876e8ddf59

  • SHA256

    4786927be2f2e214a20b5f50185e53bf40e0dbef2e47183e987a2b29f858dbb4

  • SHA512

    56af28444ca2694596beedb2f46161e333acd95caa9a9e9bfd8ea4de17decd12174a0425ae65dcfc0f7f1bb1cf82e949b2b0f65e85d488d14a05b75a9b266e6b

  • SSDEEP

    3072:j8vs69J56kC75iEd5b2B6lZsU8BOl2a/N4+khzu68e8hR+F:ovs6kkC7zBcjBOl2CNgi6J

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

147.135.165.22:17748

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2072-62-0x0000000002C00000-0x0000000002C34000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections