General

  • Target

    1852-56-0x0000000002320000-0x0000000002354000-memory.dmp

  • Size

    208KB

  • MD5

    325db8a0e06b6cc5340066bc9587530a

  • SHA1

    90901ff39f7bc3d08529791984e08d8041d2a21b

  • SHA256

    a355f078ce856c02c13c06b7dbb3aec3d6b61edd344d75291900fc990aeb0efa

  • SHA512

    235d12f492f31f09e9a288fd721188fedcf00465c5fd570ddd78ed8180f0b3b42ecb53ac315bc7aaf245ad4142302289e0f24e0a17f95b16dddd99369af7e348

  • SSDEEP

    3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1852-56-0x0000000002320000-0x0000000002354000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections