General

  • Target

    1152-156-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    9a8bfc6307c59eaaf460d0a39c0408d5

  • SHA1

    2a09ed8325bfc9134b202d0bf054043d9d14de6c

  • SHA256

    4a02b6d09e16c2728ea82941a7f3d108da41459d6fefbe2df66872ce2dd92cd2

  • SHA512

    6e9f2e7eaf1bde925b3ade0a15b7e37f00a2cbc317eaeb1172d6a59c707c2d8e74addff61a45f5f4571570639f32778eecf54f34f81ee99720cdf5865ddaad8e

  • SSDEEP

    3072:4aCI4M9nFHI0wR/n1OWlDfkkYXmbG8E0gGSNhARJ08e8hl:4aCI4EHI0wR/nrXYQG8E0yARi

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.38.95.107:42494

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1152-156-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections