General

  • Target

    2612-57-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    f65c2d87387e6269bb539e472b876998

  • SHA1

    9cbfa42ee9d21095ead1c4306deb2e390645cee7

  • SHA256

    fcb3ff289e939a2934ef1f6deeab7f15044a06942778faafdfff135538934bab

  • SHA512

    b40d038e892c34a2d50a82784c465c6104925816b5e8c2f6df8848fe18b724101621331acdf76f4e8245b95424a92c2ed502daa1f71e97fb86c4bdb939755d8d

  • SSDEEP

    3072:Cdddl71l0FI0KpQxlORa/Wj+Ylj0OE0qJRHHjJ:CdTlwFI0KpQxepj0OE0EHj

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Buy: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    18f282243ca918bb8571dc26addba30e

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2612-57-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections