General

  • Target

    2844-44-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    0d6c42f06ac887544611517531ff661e

  • SHA1

    20ff2e3819960e32a9ac743954605b31d7c691b4

  • SHA256

    c786322bae9a907008f5cb4672ef0080c15004eee981ee27953c76cd46d01e82

  • SHA512

    3e28fcd953535e8a8885765fae52b53ca91d7f64d0328bfaf0e8d024b3d518f8fefafee4af2e7cff1aa05efb5ef3edc06769ddec438a35aa68de487fbb93a1c6

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2e3teulgS6p:rAMOY3+zi0ZbYe1g0ujyzdI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.202.55.51:55615

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2844-44-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections