General

  • Target

    2636-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    0d75f7152865ed906c791e9db73836e2

  • SHA1

    80480cd218f7019cf648cae6948d29416162f18e

  • SHA256

    f5d31f48245577f5cf1a71a4c25f922af9a11f7879082954a08647ac6ab3d9a2

  • SHA512

    d755c9565c09ff5ee86b91ccc7d587dbc75f02fbe9ee2c72655cb5a10c9ff8b793e1a23346c1e611748f82930b0c470c0997f3b5c1c3b14387e017533209a26d

  • SSDEEP

    3072:+ZN5fCZUI0HOHgNOLmbklS5/ty+E0keCUyMSLHK45D9J:+NKUI0HOHglly+E0XyMSLHK45D9

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.83.170.21:19447

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2636-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections