General

  • Target

    872-179-0x0000000003E40000-0x0000000003E74000-memory.dmp

  • Size

    208KB

  • MD5

    f38536b159d6b830c490448b279bd022

  • SHA1

    fafce1687cc07025558cf8ab693735dc0adce00d

  • SHA256

    e2138dde277361fc9273b7c4fb2f47dbe7afa2ed1fcd43b3205bd067ddcc5b6e

  • SHA512

    df2f2887fd472cb365fb73a166b8c3f72298ecdb18090e67b06927d60d5c4b631c9891dba5aaa51a1195e74f6b272b0685d04c7905510aa67c6ee487ab5a820f

  • SSDEEP

    3072:MW3s69VvJMzabHEt82BCHJam9UlCQXD/2brWI4+okzBby/8e8hg:p3s6NMzaBJpK+brWIFdS

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.49:6932

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 872-179-0x0000000003E40000-0x0000000003E74000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections