General

  • Target

    1500-63-0x0000000004810000-0x0000000004844000-memory.dmp

  • Size

    208KB

  • MD5

    8232d580e9f53c8d415c25ccc9cc0de8

  • SHA1

    69c41d004d4ffa60d2bd919dbf1ad08674b9994f

  • SHA256

    b24b39777851d50e7bdfdd486682cdbeb9092ffeba6d0d20dd2d5b879762dbab

  • SHA512

    2b5f6c0824defc466f4c1f3fcc23a6f6248e18bc3bbc1a22dae4265141c5f0e18c3114386419e1fb1f19ab6f60a475e80f811840d33b76746c496973eaae7c83

  • SSDEEP

    3072:j8vs69J56kC75iEd5b2B6lZsU8BOl2a/N4+khzu68e8hR:ovs6kkC7zBcjBOl2CNgi6

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

147.135.165.22:17748

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1500-63-0x0000000004810000-0x0000000004844000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections