General

  • Target

    4184-0-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    46a66fe88e25d21ac811f5b1ea20715a

  • SHA1

    8c401dd951b52b48f717be37d7901ff22c5fe7c2

  • SHA256

    ed33fa5c46ef8ab1a1b3f90f801c7c06bc2e8e831884a0590e9c01ad610087b5

  • SHA512

    1ac9308bc9637eea09dc3c05b888eb67768db22c23077425baf5bb3afd10bd25ef45ec865cfed93644d87147014acda072cda8f00ac7107d5a23b3d2465601e4

  • SSDEEP

    3072:HpJN6UKUI0ugpPWOCso1C+ppqE0OUQkQDJk8e8hV:HpJMUI0ugpPUppqE0NMDi

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.38.95.107:42494

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4184-0-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections