General

  • Target

    1008-344-0x0000000003ED0000-0x0000000003F04000-memory.dmp

  • Size

    208KB

  • MD5

    d0c223a85fdf5c52d3a3a7c451e90741

  • SHA1

    2f481280310888382eb132bd7f96b072c0f96d1a

  • SHA256

    6c5e1143960c0c64977a0712115b5fad387e02612db4f8d21d1725fbfc977f2d

  • SHA512

    5aee0acb441b75264475bc298e937d021cffa6a4f7f5a292cc74c527b4df07b1ef706d98130b237e48498eae408919529f16ea225d68098cc217066815ee42de

  • SSDEEP

    3072:MW3s69VvJMzabHEt82BCHJam9UlCQXD/2brWI4+okzBby/8e8hgFGu:p3s6NMzaBJpK+brWIFdSr

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.49:6932

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1008-344-0x0000000003ED0000-0x0000000003F04000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections