General

  • Target

    1372-66-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    cae8e2e6642d763ebf153c406b055970

  • SHA1

    bf65493a17f12da80f053244745b15d7cd7acfc2

  • SHA256

    8e71de086281ea4a9918db5c78c6aa2abd26e25543d12198bd445cc3aa7a2a90

  • SHA512

    b630886796587b315e2d67d7639accdb74777b2553620d39a874de3797afcd67742e63cf0075cd4878e14ed7a3b812b2c249841faecca8bcd0877dbe14e06f21

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2H3teulgS6p:rAMOY3+zi0ZbYe1g0ujyzdr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

194.26.192.248:7053

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 1372-66-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections