General

  • Target

    1636-33-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    5695f72e264ba2ee04615923c0c4c71c

  • SHA1

    1eee084f411b1dbbab9c5be8be23a8ddf6d61e4c

  • SHA256

    9094f70af2de0f7c9d6674a69f4d53399767678f444b1433eee7c588cd0e2cb9

  • SHA512

    f97de4fdbf047bc8abedead54415dcddb7cda036f109884fbf06dc42d7b8dd4536d1c51ad80260f99e3ca1a21667022d3db3f581325b122b9c157ad16e2534c8

  • SSDEEP

    3072:e+Mzp0WHo0oI0TKclRsOtSoii2EzsQE06hPEVQYdMAYJ18e8hR:e506oI0uclRkQE0LQYdMVT

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

146.59.10.173:45035

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1636-33-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections