General

  • Target

    1460-1047-0x0000000000C30000-0x0000000000C4E000-memory.dmp

  • Size

    120KB

  • MD5

    8475434ba05abcbd1162a83fef4c136b

  • SHA1

    7fa99a8a2e2ef3a57f51304b9fcddb66f7151dce

  • SHA256

    80a560d8d67f749ef130d01fbe0d80a280da29e4bf1158d59494c17c569ae286

  • SHA512

    e63697a83eef4286a7e2dfac634e688bc996a15e4fb72e0bc97238e53cf9545b9994be6c5fdaf996944095f332b69f79a4f6e9e1380dd3c68de746f73a392246

  • SSDEEP

    1536:xqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6p5l:ft1FYH+zi0ZbYe1g0ujyzde5

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1460-1047-0x0000000000C30000-0x0000000000C4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections