General

  • Target

    3032-520-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    33222571ebcf9b202a9c52196c666b28

  • SHA1

    c24765bae117428abde8bebba54f9e1416247535

  • SHA256

    6a0dbd1787c9e402f53bad495f69c86d21cfb0ff6648700187751b6d312ccaf5

  • SHA512

    89365e094de5b543e3781d3457347bd5b363a9998393906b27c35fdba2c2aadc03b8284b493909f910a45007075677f2e3b90db88734daa4c2948cad3656a2bb

  • SSDEEP

    3072:0Trv7Zn47I0TCcc0O95bb2uME0eCbbX9Xp9buoJ58e8hg:avS7I0TCccUuME0J9Xp9bDP

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-520-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections