General

  • Target

    2820-69-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    f086bdd7ce3908c5279ba37db73700eb

  • SHA1

    6278c0fe6fa64cb19da6d1fed89a9321d3bd11c6

  • SHA256

    863f3af8ec7a9a16c1bd63b5a490e9f309899c94173b9265adb5be864bb9c770

  • SHA512

    2ad12dc9e995429db6349b504af26aececf24e811534fe853c76fb31ccdc7ee1fb40a81d570a47eb8bee413be735f4d5e00bfa692999d77b3b9cb1f2d9a61ace

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2y3teulgS6p:rAMOY3+zi0ZbYe1g0ujyzdk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.95.168.220:55615

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2820-69-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections