General

  • Target

    1092-11-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    a4b1bb6c86cf108771e86e4dc231533d

  • SHA1

    3de0c45031fe386f5b52aa6b3a3dd3ef1a886724

  • SHA256

    6dc4034036c52a7fb35dc26629647d3004e578b8055dfdf73728285a01cc060e

  • SHA512

    782f00de805afaf17fb254f99197f23265ff9ba405a7a8c113e374d828d00df3130a3ed595aa409bfe4c6f4d68b1649e81d4f504673a8099708bb6a2be0c39ae

  • SSDEEP

    3072:jRlL+5XgycI0YXupcOlZBqH9YP04ME0q1nDfWT3JF8e8hE:NlL+7cI0YXupuYPfME02WT3D

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.10.173:45035

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1092-11-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections