General

  • Target

    1716-348-0x00000000013B0000-0x00000000013CE000-memory.dmp

  • Size

    120KB

  • MD5

    860d871bf0d3137cc3aba710b1bf04a1

  • SHA1

    43e9963900875f20fae3c2526e03e02839c277dc

  • SHA256

    43106a7b9c55db3406d314f44b804f38bcec5d584ded90d2d22947fb231fb39b

  • SHA512

    7103cfa7b9c01e150a689263a6441280aca6cea3b978d18bc95ea87c3fc0a14999d48357f504523b5d7cca9c0fcca45312d70669b6fd7457a5d2a121d8b74eb7

  • SSDEEP

    1536:Iqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pcl:mt1FYH+zi0ZbYe1g0ujyzdec

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1716-348-0x00000000013B0000-0x00000000013CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections