General

  • Target

    1320-127-0x00000000043A0000-0x00000000043D4000-memory.dmp

  • Size

    208KB

  • MD5

    c6804bb5b90b856aa75ee2db5aa07809

  • SHA1

    c83f0d10e82c6ef665f49aa64c8f5387082a256c

  • SHA256

    49128c3a8240b38caa9eacbd8c04e2e7c5f1138bc54d890d77b828e23330ccbe

  • SHA512

    4398e389963b2582302bc50a00f5ecd19430c28ce5152cb1ef5641a9e1ac53dcce3ae83e1487fb5d1a640b45ad76b407cb40f2e6407fe747eb4f8ccecc07d1bf

  • SSDEEP

    3072:Zacs69mY3tmFiIEcO2BbyFwQAUOqtEm/CqQv9COCoKvlc4FIz1YF54+YEzPd8e8F:wcs6TtmFww1F1YF5dB

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.8.114:26642

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1320-127-0x00000000043A0000-0x00000000043D4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections