General

  • Target

    1932-365-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c2b89a185f05b0f12d6af5f7876fd3e0

  • SHA1

    e3aa5e33e9eb431d3175c67e499d29fcb6ab513e

  • SHA256

    404349d8822e7ce61f2beda04d0ddaae42e79d51d80800198601c58666606240

  • SHA512

    4b42ebd7272307ef3b03d226d1d97a814f95e81fe7a1ea5c3bc7a9bee61b7df2d0eb1f479c5ff8c026c361de33932ca1fbfccfc55191c4e6e6f2a6f9371fedc1

  • SSDEEP

    3072:7Trv7Zn47I0TCcc0O95bb2uME0eCbbX9Xp9buoJ58e8hg:DvS7I0TCccUuME0J9Xp9bDP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1932-365-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections