General

  • Target

    1524-83-0x00000000012D0000-0x00000000012EE000-memory.dmp

  • Size

    120KB

  • MD5

    37944ebd574d3be2fb7e20b5964612d0

  • SHA1

    1364aef2f2d94800cf29abff332454be61111538

  • SHA256

    73979fdd5e11b248dfd8d5086f9b6279b6765ba4ddff5f41d671fd55e5593d83

  • SHA512

    217dafc2deebb5f2f032f8be3709d7481dc9e6575e86aaf7e8b85d31b9bcd54f52b563e37f39cf30421b3bfcabd2cd2735f7d554b3671f3bfbe3736fa8fd02ca

  • SSDEEP

    1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2z3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdj8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

135.181.204.51:20347

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 1524-83-0x00000000012D0000-0x00000000012EE000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections