General

  • Target

    608-56-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    64a7ee8f63fb1702b700d27ce65b23f8

  • SHA1

    14288f1ed2ce9d23ca6605d94e8dc57be6ece2c6

  • SHA256

    7588282960763ae34ca4d2ad5edb4b44bb8aee9abc7fd5cbebd9803d45090995

  • SHA512

    f0b74098b9f1f83bc254396d6c6a4f59ae3840b898e49dcaa0b640f635a65923f1147bab2155397e5103aa17e47ac3f9784f67533c03ac1f6e9e6a3868adac4e

  • SSDEEP

    1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2V3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdR8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

83.150.217.106:26463

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 608-56-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections