General

  • Target

    2980-74-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    19c1d2254b4f692f17c8f9180b5405dd

  • SHA1

    4ea7e633a753513278b8bca5fe358507cb7f26bb

  • SHA256

    2d6a8010e8c6cb8154447a34b7fa3bb3aa357fe01c24662a3038b3b6e5860787

  • SHA512

    464fad86d184daabf90619eb89963a736ee5ff81a21dcf6771dd0e1b75f307e6afe33095b1b7bbd29a0cfd0d5d34c46b2d7e23a473ea06c7e085a75976276b56

  • SSDEEP

    3072:XaCI4M9nFHI0wR/n1OWlDfkkYXmbG8E0gGSNhARJ08e8hl:XaCI4EHI0wR/nrXYQG8E0yARi

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.38.95.107:42494

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2980-74-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections