General

  • Target

    1748-195-0x0000000003200000-0x0000000003234000-memory.dmp

  • Size

    208KB

  • MD5

    47de9276b602517beaf6654ada5d6222

  • SHA1

    be430edf463db098bd66a126c74e87f6d7a93585

  • SHA256

    5c55a9aa0af4e4c56fcb30633d96c65c883a5593bb28abd679269cbe244a029e

  • SHA512

    89c031a2a0a0402aea0172ee83d78e69fda4785014b2b73dff21971352f490e3b1aa30a551bf0d1791e942e42953a0c0847c05139deaa37d093a9831a47bfaf6

  • SSDEEP

    3072:jzhrmtU/f3YIInGpDvw/1oPYqSaVXr2nhK9w4hxwaD8d8e8hl:5rmtU/gIInG6oAqBVXrmhKZ5e

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.83.170.21:19447

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1748-195-0x0000000003200000-0x0000000003234000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections