General

  • Target

    2544-63-0x0000000003C20000-0x0000000003C54000-memory.dmp

  • Size

    208KB

  • MD5

    5b8cce8d2439ae5bb32a98b1fe0477cf

  • SHA1

    0178225a5c07b734cd1c24ed13aa28af720833cd

  • SHA256

    f1abf801ca5dad3eff6b436c4b779fcad7bcd6292ef9fbf609f76f8d65c8076f

  • SHA512

    95a76cf132d37ce7d5339f7f1dbd0fa71ca7ca1907ddabcc4e962a6f5e19a1f4f345c6b80c4521a5eb05f54f4ff31691ee2348cb0fba9027e47a221fcc8c00ef

  • SSDEEP

    3072:mqns695m5jVHLoE0B2BXkrmK7lw7Lo4+PnzL/8e8hQ:7ns6CjVHLK/laLozP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.89.201.49:6932

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2544-63-0x0000000003C20000-0x0000000003C54000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections