General

  • Target

    2656-17-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    c04dc7d4d999a277cd5e02646f6becf2

  • SHA1

    3f5975427dc0c72eecaa4f45b2822ef37dbb9290

  • SHA256

    8fd52ec18816bfb42d0e1ad1ae3983eba10a255adfcc3acea974b9edd2450df3

  • SHA512

    463a02e4e20775b914b4374c6a4d74cb54f472aa89619ae7966962a51cc09b4796fbbacdb9f4fc78bc4ef90fb212fad65c87a2f8566b75b3ccab1ffece07989c

  • SSDEEP

    1536:BqsIWqm2lbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed2GteulgS6pU:vrB+Y7+zi0ZbYe1g0ujyzduU

Malware Config

Extracted

Family

redline

Botnet

cashoutgang

C2

45.76.232.172:47269

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2656-17-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections