General

  • Target

    3360-374-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    1391f9faf0017de9e0db5ac4228b05f7

  • SHA1

    03207ec710e49b971abccd8c558cf9457bee5f5f

  • SHA256

    7eb8a1b285efe0daf5d9631e48fc74f96f7e304ee35a5973b0ce2b89c2fee96b

  • SHA512

    f100ea3344b798e6d77fbd9988a6aae8af0c49b96f62f7ee0c3da38a2dd8ac31129363ca70dbb85537394aba76dfaeaf9086c05413bd1e3f5e88d034a133d56b

  • SSDEEP

    1536:FqsCaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2tteulgS6pQl:DJZeYP+zi0ZbYe1g0ujyzd5Q

Malware Config

Extracted

Family

redline

Botnet

newbuild

C2

20.102.107.30: 33222

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3360-374-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections