General

  • Target

    2956-56-0x0000000002020000-0x0000000002054000-memory.dmp

  • Size

    208KB

  • MD5

    b7bec80d57464adeca649271c47ce010

  • SHA1

    c590ab20de005111b312cb1c531d0d7f30bf6212

  • SHA256

    af8f58410942c860d2c9c1f14a973582c6ceac296ee5d6c0b35dcf1b710a925f

  • SHA512

    24dffbacbed38fe85861fbda7031e662e5e1e9339113283218a089d5f55a8b4b600ce4afeaedec4bf3df4a92ce5658a20410185bb05e10d1e09963decaa9be06

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2956-56-0x0000000002020000-0x0000000002054000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections