General

  • Target

    1396-930-0x0000000000DE0000-0x0000000000DFE000-memory.dmp

  • Size

    120KB

  • MD5

    22e9cfbd551801db3c294355bf8a6e05

  • SHA1

    5df0ca4d7ec4968c25d179edcad7a6092f6e75d7

  • SHA256

    0f26fcef13bd2af7da6dc81b26448e72ecebde1224bc9cb7c74399a79e3a67ab

  • SHA512

    db9b9eb6f6f83f9f213c8bb6dc3bdec57a0d960547dd48913ef7ff7622b12401f467a944dab1e345a80b7bc837231645bd7081af8c30b57394afc3e1d6128688

  • SSDEEP

    1536:0qskaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pul:y7ZeYP+zi0ZbYe1g0ujyzd0u

Malware Config

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1396-930-0x0000000000DE0000-0x0000000000DFE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections