General

  • Target

    2424-63-0x0000000004010000-0x0000000004044000-memory.dmp

  • Size

    208KB

  • MD5

    74cc6a72979fa983bba534127ca92916

  • SHA1

    1da0b09b4923428786c778724efb5ccf77f1b262

  • SHA256

    476fe295041399694397b8eccf97aa35c365ab405ca617b4a036ff52e93a6de1

  • SHA512

    7c1fa278472db3a25daeda8ced44c051016000127197efc23c2a0ba31305f26de6b74831a59515ecc9b8cdf9714f21e37ff6a7f2eaec4aebf55843f59b4492c6

  • SSDEEP

    3072:2TWs69iukSYYKyET52BgQbjDPYwRUeZknrPR84+lDzW8e8hw:CWs6uSYYIyjDQwlanrPR8dq

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    ed000008c0b59caf793b48c8ea9a7233

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2424-63-0x0000000004010000-0x0000000004044000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections