General

  • Target

    2096-59-0x0000000004020000-0x0000000004054000-memory.dmp

  • Size

    208KB

  • MD5

    2026b90958836385354b196dd140e536

  • SHA1

    4248362cdb50e9751cb7feb562cbdf7f8108a483

  • SHA256

    4dc85576b87099b35439fda20d4774f74b7861c7e0e48817b230e58891e82622

  • SHA512

    34d73c5986a5939fd1edb6140d68ef8c81ba04fb4cb02e540b6d73268e6ad918d033e1a1f2ced9ff72b08abe1ce2cd6c555183a5f2839547c952404f8d07fd23

  • SSDEEP

    3072:brrs690Gg877NFEk42BufCdNXOvwenR2hO2m4+wGze+z8e8hB:nrs6k877zNOoenR2o2mvJ

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-59-0x0000000004020000-0x0000000004054000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections