General

  • Target

    2560-1201-0x0000000000830000-0x000000000084E000-memory.dmp

  • Size

    120KB

  • MD5

    2b46146ee8c55b0c64c9b633d99ee606

  • SHA1

    f13870c681dab62f003c626e647eb5828c3ed5eb

  • SHA256

    afb753c981d345549d75525df02e5670047d6ba19174aae2b52c7083f868c206

  • SHA512

    581a6f49a932f6e461baaaa29e17b002b7fd5fed24dc6ec01e7d9426b6ee3e38fc589e0f3a8dda6cca94547f4f019c4f9d8cb197c307c439639db7e0b88bc167

  • SSDEEP

    1536:bqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6p5l:Zt1FYH+zi0ZbYe1g0ujyzde5

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-1201-0x0000000000830000-0x000000000084E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections