General

  • Target

    2828-493-0x0000000000D20000-0x0000000000D3E000-memory.dmp

  • Size

    120KB

  • MD5

    ece3e8d6c3fe10e6dd0d2e258027054d

  • SHA1

    35c171d2031216b8e537d9606c82d0be9ca43b0a

  • SHA256

    a899b39beeb302ba0ccc6d3dac0b363283c8e1aff2eb51213421353028fc030e

  • SHA512

    294659b2ea710925eb0926eae25d69ad790bccba25a85dbe2ad35702edb7babd836665502f3b6f0ed7655e8494cdddb763d138b79e7c1e485556dd440a7830a0

  • SSDEEP

    1536:Fqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pil:Dt1FYH+zi0ZbYe1g0ujyzdei

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2828-493-0x0000000000D20000-0x0000000000D3E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections