General

  • Target

    296-316-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    98d31b2d3bafee95ff7c924d1cc12913

  • SHA1

    dfb542f5b48624cd847e7b0502b9c40f19a09c9d

  • SHA256

    47900e783d1c9d5b41580878492acd3d908200731e0a831ab139f5625f02a3e1

  • SHA512

    060396d0cc39a4a204d24f3485b4ef38c15fbcc1c14309237c4b440fa7d82498091d56c2650a53c8750ea6e7267bc6082e3a05f9a77b675f9b40c24b2e149df5

  • SSDEEP

    3072:0aCI4M9nFHI0wR/n1OWlDfkkYXmbG8E0gGSNhARJ08e8hl:0aCI4EHI0wR/nrXYQG8E0yARi

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.38.95.107:42494

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 296-316-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections