General

  • Target

    2632-61-0x0000000003CA0000-0x0000000003CD4000-memory.dmp

  • Size

    208KB

  • MD5

    e035054f83cbf21940c626e5e7e0b561

  • SHA1

    c32fe66a61c143848433f49783ea0d645f134078

  • SHA256

    db2b6f86f06ae43df1d492b731ca1832e6cd6ea404716e42ad3ff19c4de53b5b

  • SHA512

    67f3520006dc04edb3e47609497f16291e7b98578f9438bf2ea44c08424208df0b315402a4d7defa37d68c5451df45177caf056ef9ca9bfed5bb56b752023095

  • SSDEEP

    3072:Zacs69mY3tmFiIEcO2BbyFwQAUOqtEm/CqQv9COCoKvlc4FIz1YF54+YEzPd8e8N:wcs6TtmFww1F1YF5dBA5

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.8.114:26642

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2632-61-0x0000000003CA0000-0x0000000003CD4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections