General

  • Target

    2580-62-0x0000000001F80000-0x0000000001FB4000-memory.dmp

  • Size

    208KB

  • MD5

    c1b7fd79db59ff6a8cd2055d644cd5ca

  • SHA1

    ab57eef205c073f908b4580d169f62de7cc12027

  • SHA256

    ce5ed4a8bf81970897a445d9380ecc8a4c1380129988c9d82b7738175d4cb515

  • SHA512

    a1089c4597f762cd1b7247273b6fa36ec9fb56721d20b7064df98d19110a3d387abf562bb479fd9107703e6bfddee9899cadee03ea6adff5c57b17b95dbde490

  • SSDEEP

    3072:2TWs69iukSYYKyET52BgQbjDPYwRUeZknrPR84+lDzW8e8hw:CWs6uSYYIyjDQwlanrPR8dq

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    ed000008c0b59caf793b48c8ea9a7233

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2580-62-0x0000000001F80000-0x0000000001FB4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections