General

  • Target

    2368-5-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d39d5409ec39815a788ae7b24498e071

  • SHA1

    532b5ed71251b6a386ce807acc6ecad7d775de98

  • SHA256

    1bad57a6ed81b57482c18594fba7b1b8a9e5a28c313f576857239d9a34035b22

  • SHA512

    1295694b736c6dd705a5e7a957d7a7d4c01882c2654df907020582dad9aee6c8a3aa5dabe22912e9a072a43ca5c6661f837c643d5529616f2f4aa1221bc77063

  • SSDEEP

    3072:kRlL+5XgycI0YXupcOlZBqH9YP04ME0q1nDfWT3JF8e8hE:slL+7cI0YXupuYPfME02WT3D

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.10.173:45035

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2368-5-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections