General

  • Target

    1580-56-0x0000000001D00000-0x0000000001D34000-memory.dmp

  • Size

    208KB

  • MD5

    9750f59e75833c00462e84e4f120ea64

  • SHA1

    fc108896c4a5cb5d4d48079c0268247e7b268574

  • SHA256

    91b0258b568d12e087f6f23d1d646b2eeda0fd9692e85541a310ac18ab30a07b

  • SHA512

    d150b0814dbf0a35bbd7aed3bec110e31b710f3fb6cf84ed30ba8db45d566d6576c6319d398323aeb966ab24d28628aac54cc55955e7544447e5bb18221884f0

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h07:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1580-56-0x0000000001D00000-0x0000000001D34000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections