General

  • Target

    928-62-0x0000000001DF0000-0x0000000001E24000-memory.dmp

  • Size

    208KB

  • MD5

    3af44f9048df384419621a23f34eac42

  • SHA1

    a1ad80e482ed7783cc13ba0ebbbfe8b02fbea06e

  • SHA256

    208b266544e0d00b56cf113e871c2c2bd7cc0c8d3edee0cabd43b82d67dc93fa

  • SHA512

    806cdb20f58dcf25d549e091aed2868deb52fa944fc4ed660f40fbb4aacdaebf626474ef0cc8e62f235faa6396822c07ecab469256cc43612b96a1b1033f9a21

  • SSDEEP

    3072:E7Cs69KyIoAwIQE+V2BmnrkMS8bx4+nIzCv8e8hKt:sCs6KoAwDkMLbxMS

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

147.135.165.22:17748

Attributes
  • auth_value

    ed000008c0b59caf793b48c8ea9a7233

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 928-62-0x0000000001DF0000-0x0000000001E24000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections