General

  • Target

    1112-56-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    aa5d1d0d495206909f5559d28d3b1379

  • SHA1

    392c70a946f46834f871126ac5121bfded180650

  • SHA256

    6871bb4fbe11f8f637424cea7f2f4c02521099cf47168b1e9f5db1725e09dc2f

  • SHA512

    a9680859ec16f8b7f0adbd754eb0f0bf6cf462e6d452262c16f041b14728c8fc6c558f45a7c5d336d0e56dd4e9282fa9e03f281b7e64d2058d53811088512e1c

  • SSDEEP

    1536:3G6ijoigMKqiv1ekSHLHVs0dehi3VYTPWkcuWVgPQ37smbfQxv0ujXyyeddf4iwH:0Gv7YHtdeXTPWkcuWVfrhG0ujyzdxQ

Malware Config

Extracted

Family

redline

Botnet

5427245849

C2

77.91.68.37:43753

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 1112-56-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections