General

  • Target

    1964-61-0x00000000047F0000-0x0000000004824000-memory.dmp

  • Size

    208KB

  • MD5

    2345b9a1f0627964bdc63d3d68b9c414

  • SHA1

    e02792a954a904354316659a7ef95261a62159f1

  • SHA256

    b5b0c4d64fd088d82c656216c9402efed148ef1280dfcae607c709cc75ad9583

  • SHA512

    44163aee314cf1a439d4ab3d439f0fee488eaff2ee93022e098ac117fe43da08bbb638db553cc56dface830d0ad3ec1b7aac83ca052b7605e5dc3303aaa72cda

  • SSDEEP

    3072:XY4ss69EQn5lcO3EMU2BSIQD4Wxo0YESwoX5mWMv9054+aDzeq8e8h7:rss6d5lcH1WEyX5mWMv905kT

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1964-61-0x00000000047F0000-0x0000000004824000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections