General

  • Target

    2556-63-0x0000000003D10000-0x0000000003D44000-memory.dmp

  • Size

    208KB

  • MD5

    c59e6cacb36e966f2f6b49d441e19812

  • SHA1

    d79fa3b2e9c722c671b65f6a514809e9ff0b021a

  • SHA256

    ad0a94c039d5c602f02271eccd6303c4bf2cc59af25c1dfa8bb9c7369c26d1b7

  • SHA512

    08ad7adf159026abea6ae9a0b7a2a885e1c01bbaccda303c8066941a9a0c88641ae5a4ba69d1ef1966bcbc677a05c9a8ade03086ff48cc681d27ac1d94df558b

  • SSDEEP

    3072:mqns695m5jVHLoE0B2BXkrmK7lw7Lo4+PnzL/8e8hQ:7ns6CjVHLK/laLozP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.89.201.49:6932

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2556-63-0x0000000003D10000-0x0000000003D44000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections