General

  • Target

    2680-42-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    f224cf3cf20f73ccddb74ad9a898952d

  • SHA1

    7f59850081398e43e0312c7620f9bd4934eb30dc

  • SHA256

    a52d7abd500981f73960ccd6e688afefd9f53ecb29e753215df5becad06a24fd

  • SHA512

    46d40648f8b34afd799b4efe0503407b7297b5f1a5d484ac78cac4ed129c0bcb1333a0bd627a62be5ed5e05f15bd0b28d18ad50c149c5f83a491e62c3dd4526d

  • SSDEEP

    1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2O3tmulgS6p8:XEwiYj+zi0ZbYe1g0ujyzdM8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

192.248.185.22:55615

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2680-42-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections