General

  • Target

    1612-1101-0x0000000000E60000-0x0000000000E7E000-memory.dmp

  • Size

    120KB

  • MD5

    e6245c6c0618434c3a376154c674ff27

  • SHA1

    9a308ab8c914f4a7554e908fbc9dd1dff65aee15

  • SHA256

    f69c99ee0b19037890bea646512c4ee472051d62c3e48fd5372a59f59ef6c935

  • SHA512

    b983d9021e8f411c62f4d3ff3099e983d3ea674bcc815167651dfedcfd6f97c1f615197748ff95860d5d7d0b1f79c7feb80d9b0dd46ca0ff2e7a4403c82ea61b

  • SSDEEP

    1536:Jqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pul:nt1FYH+zi0ZbYe1g0ujyzdeu

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1612-1101-0x0000000000E60000-0x0000000000E7E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections