General

  • Target

    1932-73-0x0000000000570000-0x000000000058E000-memory.dmp

  • Size

    120KB

  • MD5

    b8ea0e0c3c6c5b6174791f8f3c02e7d5

  • SHA1

    4c751a99876f7c35da5491bf3b1a0156f97312d1

  • SHA256

    2a106821037149320557be73769f0672e3b81c56155a9c62127c31bbd20b4b59

  • SHA512

    c4a51937e55f370afe649f0ad37fc65539c74eda7e72fac389220c68d19c880faf5291486db061efdf62f12c5bcc0c3e8b1d93b182b5e8d5369a1de327bd1800

  • SSDEEP

    1536:NqsIiqeHlbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2mteulgS6pIl:7vpVYH+zi0ZbYe1g0ujyzdeI

Malware Config

Extracted

Family

redline

Botnet

CHINA2023LOGZ

C2

193.42.32.107:16808

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family

Files

  • 1932-73-0x0000000000570000-0x000000000058E000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections