General

  • Target

    1632-61-0x0000000001EF0000-0x0000000001F24000-memory.dmp

  • Size

    208KB

  • MD5

    2348b63ed68692d8bbb1ccb531909ed4

  • SHA1

    2da15db9631c89b91a885a205772b44511d9dab3

  • SHA256

    32f305ed06e52a762fb69352426b6e387913c0080e43b39d4e8875a6fa85c387

  • SHA512

    47801b5b9d2e423fa443b89329c37ae6bbd8f4d5eccbf6fac293953ab66a01987674b57dc988717e8cd8ff2598478d784af23c8629cefd3476a8e9fec75647a2

  • SSDEEP

    3072:8gAs69P0lH/CexeEwS2BsU8Ev7dTuFZM4+gOzX7L8e8hrr:nAs66H/Cew8EpTGZM3z7L

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

213.32.110.216:23067

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-61-0x0000000001EF0000-0x0000000001F24000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections