General

  • Target

    656-380-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    e77e4f5ce31dfe5d0e3fc4bd1207f5f6

  • SHA1

    a0da2a08310e0200cd6cbed4f9669a468ae3b8ec

  • SHA256

    76f1238b090b8373fa97c1747c90288541c3e42de7e0fa6de69fcc9ca8fcefda

  • SHA512

    fe7be302d6fcb89ecaa71ad1625a7e41154c0719814174e07dea85132482a17d548030fe614905b171d4080c5ad697004aa4b89e0e5fa0c207b1c180ecdd535a

  • SSDEEP

    3072:STrv7Zn47I0TCcc0O95bb2uME0eCbbX9Xp9buoJ58e8hg:8vS7I0TCccUuME0J9Xp9bDP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 656-380-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections