General

  • Target

    2480-61-0x00000000020B0000-0x00000000020E4000-memory.dmp

  • Size

    208KB

  • MD5

    0b82e71efa8249fa674bceae13e29dce

  • SHA1

    48c6eb005ce2d5d5397ac8a880c0a6cd0fd00ce4

  • SHA256

    a19d08326a3a2259c662f6e7687e5caa3503c211d72f75f014eac0ffb14a2cb1

  • SHA512

    39e09852140f411f8ac028353626aeed813c68a7cd3e22e1cb5c047f85a336fcd13f1181b2fce91a1816ab1e851517d10777e1d8d6a669b6a5b619dbcbc27fc3

  • SSDEEP

    3072:XY4ss69EQn5lcO3EMU2BSIQD4Wxo0YESwoX5mWMv9054+aDzeq8e8h7:rss6d5lcH1WEyX5mWMv905kT

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2480-61-0x00000000020B0000-0x00000000020E4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections