General

  • Target

    1712-58-0x00000000033E0000-0x0000000003414000-memory.dmp

  • Size

    208KB

  • MD5

    4a2c87db904ab79f194869b3d80090b1

  • SHA1

    5efd640e01f96f06a6d7848258871abc642a6e70

  • SHA256

    8cc2f7e075a304593d5ff1aded0fdeaa7f3912e9186b71281b2556e091aa356a

  • SHA512

    cab25e8357c441f2f644706459fe081b1d721a9b86a0fd52326c5f82abf04c8eb2fd6cd9be18063567c7c941f5b1faf71888127d3a017daea272b54bae9963cb

  • SSDEEP

    3072:+nrWs69CuAfvp/dEXJ2BOdcHrZBlbzHd9sTbg4+tazlBi8e8hR:YWs6WfvpzHrjZz99sTbg45g

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

135.125.27.228:39396

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1712-58-0x00000000033E0000-0x0000000003414000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections