General

  • Target

    2164-485-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    6a71fe16ed0a0e4311e50f53e718f36a

  • SHA1

    84db90b09debdba1e8cdf14ea2972eb19d90e17c

  • SHA256

    99f9447a2f82aceab130c6e730cab9657d1d29979d23148dd79ec928068426a1

  • SHA512

    1dd65608da5c3c98ab910d65ffe23b840620b42b4e8a56f6baa44f4946ac35590f0039a47a1ee985e4553f6324e519c2c568561489c69c5e29c2bfbb62b7cdab

  • SSDEEP

    3072:LaCI4M9nFHI0wR/n1OWlDfkkYXmbG8E0gGSNhARJ08e8hl:LaCI4EHI0wR/nrXYQG8E0yARi

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.38.95.107:42494

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-485-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections