General

  • Target

    3056-927-0x0000000000E10000-0x0000000000E2E000-memory.dmp

  • Size

    120KB

  • MD5

    693150180a36552b474a73903936d8b6

  • SHA1

    c4f0d18b11c35ccc4acf8d580e0878d2958a1c6d

  • SHA256

    2f99bbffe954f14421dd61bdefd5c5be886a4928d2ebae1a16cffe8c2caafd80

  • SHA512

    f477c4263d4503bd128d7eb3783fa3e45ef15216473a38a3d145062d2b7afe1cef3226bf015cce101a0e24550727259a1cf2c63a039e479a76ae7925554d1ccb

  • SSDEEP

    1536:8qskaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pPl:K7ZeYP+zi0ZbYe1g0ujyzd0P

Malware Config

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3056-927-0x0000000000E10000-0x0000000000E2E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections