General

  • Target

    2200-62-0x0000000001A60000-0x0000000001A94000-memory.dmp

  • Size

    208KB

  • MD5

    96c392187914c43f00c6ac84c8654bf2

  • SHA1

    8ee00bef62e0ba72973c803cde8bbeb0a9bb1d12

  • SHA256

    33e826c896540666070e3591de4beee2b36a8a5be8a99b7ce0c8edecd055404c

  • SHA512

    84d7d9275893128f378dce4f9879767af6d35762830a01d72de0a2775c0fdd0b55a3f6b8c42f6375d8f112aa96a7275144991a62c1d4523e62515a4b016193a8

  • SSDEEP

    3072:oO9tmtqDf3YIv5GPA+/ttlOu3lEDUG9PdHd9wEMxwaZgdl8e8hR4:FtmtqDgIv5G93lSd9PdHdsS

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

209.250.248.11:33522

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2200-62-0x0000000001A60000-0x0000000001A94000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections