General

  • Target

    1072-61-0x00000000003D0000-0x0000000000404000-memory.dmp

  • Size

    208KB

  • MD5

    85d212e3a3542fca8904625705a7902f

  • SHA1

    e51735d58e27b9625a027b75e5652766561a2412

  • SHA256

    02d83ee4c4060ca9f00731376cd868d3f89a3f9ea602ce3cf6987ff87426d38e

  • SHA512

    40e49b81d319f3215f913b604e88851208ef4e6db5d3444546bc96afb82dc1614a10343b148df34378186eea2498e85d722889b674925944e950d8e10f87f267

  • SSDEEP

    3072:Zacs69mY3tmFiIEcO2BbyFwQAUOqtEm/CqQv9COCoKvlc4FIz1YF54+YEzPd8e85:wcs6TtmFww1F1YF5dBo

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.8.114:26642

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1072-61-0x00000000003D0000-0x0000000000404000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections