General

  • Target

    1152-405-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    bf95e95f6fb1fef0866a715b43645bd4

  • SHA1

    7b97dd35b9fee277d7eecef5f47ca9bb1f28079d

  • SHA256

    9028ab17dd80a00fcd797669369738f8904361e6f705acb190d7cb2222a3ec48

  • SHA512

    920fb00d7c1f9c712de26cba38d5aa529f5ba92e2d058da650bd209ea1f7fbc9313d533634ce8d833c8e9f9bd719188ffabd7d308e90d215b7d735a72a2d1d3e

  • SSDEEP

    1536:xqs+jlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2/teulgS6pk:f2UeYr+zi0ZbYe1g0ujyzdbk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Muck

C2

52.232.8.179:37764

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 1152-405-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections