General

  • Target

    2072-79-0x0000000002090000-0x00000000020C4000-memory.dmp

  • Size

    208KB

  • MD5

    5b07941a3f0499b6700678251ea4b85b

  • SHA1

    52bde614e8093c856bb883c6bfd9d8714f0b2102

  • SHA256

    5fc0e6636683a549b249d18a7506a0ff67491d09689dc4462fbdee0d19109685

  • SHA512

    3bdaf2bd61bf8d13f544a3206aad20c2c14f299dd720ecb7c96da6c741df99ffe1797afd3929ec0569c03bcf03ba83bca35a37fb4ffc65897c98446e28a613e4

  • SSDEEP

    3072:lCZs69PKwaIJWME5M82BRZdU4nFR/hRoVc4+oozdIW8e8hE:sZs6FaIJfY4FR/hqVcN9

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

213.32.110.216:23067

Attributes
  • auth_value

    ed000008c0b59caf793b48c8ea9a7233

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2072-79-0x0000000002090000-0x00000000020C4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections