General

  • Target

    596-978-0x0000000001320000-0x000000000133E000-memory.dmp

  • Size

    120KB

  • MD5

    c4c1a947c3f9d450ba0ecb900ffa6da3

  • SHA1

    159365ae68f1db344bba26b7de960c29f97ed940

  • SHA256

    242ef41bb249d064daf204aef8b4061de48cdc7db7f953dcb5e7b8e2b9c67998

  • SHA512

    b0d5b744e9f96f01d196374daf4093558671d898710b7bc1f1f274f9ee20d96b65faf22dc5004922c42495ceb53471c63e69512e6f9e3eb3889cb72273c8e116

  • SSDEEP

    1536:Rqskaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pHl:/7ZeYP+zi0ZbYe1g0ujyzd0H

Malware Config

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 596-978-0x0000000001320000-0x000000000133E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections