General

  • Target

    2040-56-0x0000000001DC0000-0x0000000001DF4000-memory.dmp

  • Size

    208KB

  • MD5

    49c6951f4fb4a90facfba3c9f5538d05

  • SHA1

    156572e65c381a3ddbedfe253d69dd96cfe4300e

  • SHA256

    1ec9b72e34d052f95f7e9d73ac3e2aad71b60bbc2e76400b7a414f94db90fa9c

  • SHA512

    19162d8f24978ec75e2f4e0f8691cbce04259acfbd43eb46825d9b3a7f8a3b3fa92aa588efc6ce70313037764476e54a9cb4bafa2ce88447ae7651b39352f886

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-56-0x0000000001DC0000-0x0000000001DF4000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections