General

  • Target

    4952-253-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    a1ff940c3ffaeadd90fd4e2a8be4966c

  • SHA1

    793adc8d7c0709835567647e84b0da08a2ba98e6

  • SHA256

    f1e6535cfd80889d1377931d16fdd430c3b9be88e14b1414c62cd43a6fdfa471

  • SHA512

    fbdd3c4de8dd870a8286f7a0c3012f2655e89b91ce4ddbe7b1671286766f1d1a9161583a7cfaa988e3f4ea71e37f44548101a41d70f438f4b3f588e18cd59864

  • SSDEEP

    3072:QTrv7Zn47I0TCcc0O95bb2uME0eCbbX9Xp9buoJ58e8hg:WvS7I0TCccUuME0J9Xp9bDP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4952-253-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections