General

  • Target

    2576-61-0x0000000004070000-0x00000000040A4000-memory.dmp

  • Size

    208KB

  • MD5

    f6d21dbc91b1604a96b37dcb3eb1b65f

  • SHA1

    a85e10a6c991bce7fc670df0cf0270b9e8c3871b

  • SHA256

    099a85d20eaea5b5e4eec2432462fcd1835713cfeb314407a5a5a7935071cda6

  • SHA512

    b7e8800720e02cabaf8dcb1ba5c0e6b9fd405ae28a89e0fffd409a3e41b587d39a21aa98f846a7ecd9a994bff6f8b0087c573c7e6ab85aee06cf092a13315f9c

  • SSDEEP

    3072:Ptss69Zkk1dPklTTE10m62BJuG4IHxkuEr4+qyzJYRC8e8hf:Fss6h1dPbdbxvErbNH

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

149.202.8.114:26642

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2576-61-0x0000000004070000-0x00000000040A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections