General

  • Target

    2984-61-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    7ac988ce6fff936b43f447beeddc42c0

  • SHA1

    d15c10b8f6e4ef8fe22e902079a47a28793d87e4

  • SHA256

    a4af5b2eb70ca94842f967f922f2cde7a3cd80af71beb13c14026e972525aa25

  • SHA512

    3cadc3423ce000791afe3d250be642871a6623fa6c922b114ef2df6693f7a29199a094f7a412d1bf5bdb865464eddc4f1df5e6193e6472b65a4da8eb1d6ea9b2

  • SSDEEP

    3072:e+Mzp0WHo0oI0TKclRsOtSoii2EzsQE06hPEVQYdMAYJ18e8hR:e506oI0uclRkQE0LQYdMVT

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

146.59.10.173:45035

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2984-61-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections