General

  • Target

    956-823-0x0000000000A30000-0x0000000000A4E000-memory.dmp

  • Size

    120KB

  • MD5

    58fbe4b5a8a39c7d06c17edf4caaccf9

  • SHA1

    218862b7498023da8c6f1ffac3b65c0b84e009da

  • SHA256

    a6243bc71448bcd9b53f35345df3609bdae1f41e1a51f009523bc565dcf6db1d

  • SHA512

    1e6fa8f0b215c2facca111b7c09aa87bd0ffda97501557f5cd1087d38ef406c0a2cec80faf37eb140e219c35d149498a594f154946e1ba8f0698d4159a6f7c73

  • SSDEEP

    1536:/qskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pZl:dt1FYH+zi0ZbYe1g0ujyzdeZ

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 956-823-0x0000000000A30000-0x0000000000A4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections