General

  • Target

    1948-1562-0x0000000001020000-0x000000000103E000-memory.dmp

  • Size

    120KB

  • MD5

    2001f24046f5da2a8ce8e285f8062b16

  • SHA1

    53b9de0e074019d4cdf253edafcbc1fde391bfd5

  • SHA256

    55b9bd247687b1b9183817e2f1bfd763e869a519e3a684025e1ba262d513c5dc

  • SHA512

    cda5ac2a8626bf506d217f0ac4ff29a187d9c27f68b526d05fe42b2e50d5f8cf5b1346fbfe9903a095bd407a316afb628e5b06cda4479fcc686916a30896171f

  • SSDEEP

    1536:iqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pvl:At1FYH+zi0ZbYe1g0ujyzdev

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1948-1562-0x0000000001020000-0x000000000103E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections