General

  • Target

    1104-1229-0x0000000000C10000-0x0000000000C2E000-memory.dmp

  • Size

    120KB

  • MD5

    b8b581931a24708884d943bb1013281a

  • SHA1

    6597d2a9ee12d5b7df00f8f1fc57e017a5ca2e8d

  • SHA256

    329628f662fb3d2d40a89381070e835048ee537c37dfd862771a1b4643220d47

  • SHA512

    de4dad952a4a8b8dbac8a4dad01edd839574f2b25317d1298fe942a4ce368bff36fd9ab163cadeb6d770e61060302acf3879384990bc8162141a618b3c9eeee6

  • SSDEEP

    1536:Nqskaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pvl:77ZeYP+zi0ZbYe1g0ujyzd0v

Malware Config

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1104-1229-0x0000000000C10000-0x0000000000C2E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections