General

  • Target

    1984-57-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    33d32aff839b07393b80121f13386bc4

  • SHA1

    8d4b402255196a01eb26d6be4a935f4731f4fd8e

  • SHA256

    15060a7583679417cb4dd99da92f1bae1184529b424a08aad5a3641bc6b31ddc

  • SHA512

    bfded8a9b02d57f04c4ee68832b658dc1b38bf9597c05fa51dd71e05f0348c4b94edbc1745eff892dfe45c6cd010bb5600a676a6f538111c49904cd25b380962

  • SSDEEP

    1536:RqsCFRcqWClbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed2WtmulgS6p0c/M:/yRclyY7+zi0ZbYe1g0ujyzdC0N1

Malware Config

Extracted

Family

redline

Botnet

Redline A

C2

163.123.142.155:8036

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 1984-57-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections