General

  • Target

    588-56-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    e525d445e314305c737a405fa2938262

  • SHA1

    ffc6249518f1c3fe2c6ba2253d1e31490af8bebc

  • SHA256

    4d05258f64e91b42fcbd818b9c5050d13dd4aa755f7f5673513e219434764d84

  • SHA512

    f8531f0747a6af8680407df4a14eafa0d90856d02fba805c5131199d18f53ae9dd1e8a9bd79db2e89f337d5239ee33110fc39a90c960c6ef4830a7c054502e76

  • SSDEEP

    3072:e+Mzp0WHo0oI0TKclRsOtSoii2EzsQE06hPEVQYdMAYJ:e506oI0uclRkQE0LQYdMV

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

146.59.10.173:45035

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 588-56-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections