General

  • Target

    2792-1108-0x0000000001120000-0x000000000113E000-memory.dmp

  • Size

    120KB

  • MD5

    937793a8bdd542459dc00d5d42cc5602

  • SHA1

    93b203ac39a60de5dd5af2c00a370444a0c8be45

  • SHA256

    833564bc8f371f6f04291ca346f5b6b14289c12d2a53a31c53fca1954c539f98

  • SHA512

    9ca56f6079bc1e62a8886d9c711e62aac3a1019aa85fc4e2dcc6b2cc062170563770ff0838aab8ef98347e722c8670444f60c5063665d2cec9d8ee9fd3b28537

  • SSDEEP

    1536:xqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6p/l:ft1FYH+zi0ZbYe1g0ujyzde/

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2792-1108-0x0000000001120000-0x000000000113E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections