General

  • Target

    2132-63-0x0000000001E50000-0x0000000001E84000-memory.dmp

  • Size

    208KB

  • MD5

    7ee9425bc38cc55e4c3387f0dd0681cf

  • SHA1

    dcf75e1ada2f469869cfbb0098b88db88147535b

  • SHA256

    2f7e9d7d208e269b74b775916cc607851018bf1e188f402fa2b0c42d2a27ba75

  • SHA512

    b0c74e80e3bf1c9c47fd457d703f463267b7d02ba26ef4d348dbb245fafdfbbdefb6a5722d009ddd0f87deaff64f2f15487fabfed051c828983b127197f5d256

  • SSDEEP

    3072:8gAs69P0lH/CexeEwS2BsU8Ev7dTuFZM4+gOzX7L8e8hr:nAs66H/Cew8EpTGZM3z7L

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

213.32.110.216:23067

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2132-63-0x0000000001E50000-0x0000000001E84000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections