General

  • Target

    2532-57-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    5e07d42be3b1c16398894eac92ff3029

  • SHA1

    759d58858755b35b465e6dc2b1d954780c042061

  • SHA256

    cc4bd4adfb63402634316ae104fa80061a03024f3c473e15403258a08764b73d

  • SHA512

    e29fd85c63a83b342463d7c1664f4a0dd7d436bccda10d6cb0121b888abdb959b282a429a3f77ebc395df83ddc839c66cb3561fd9db12fff687e217bdd7d606d

  • SSDEEP

    3072:QvQL7ObI0Cv8+4ODBWn06S+cTpmE0C6m9YdnX0vJs8e8hz:QvZbI0Cv8+X6S+cTpmE0DzdnX0vq

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Buy: @logsdillabot)

C2

51.83.170.21:19447

Attributes
  • auth_value

    18f282243ca918bb8571dc26addba30e

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2532-57-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections