General

  • Target

    1944-1058-0x00000000003B0000-0x00000000003CE000-memory.dmp

  • Size

    120KB

  • MD5

    b9ee0696471c3e68111660f33dec7f88

  • SHA1

    82f3646559c1824d12b1852269b88775a63ba6b8

  • SHA256

    a7285f7357e26abb0db3aac1ee0109e1dc4b6226405071d93832b7d1b4ca34e0

  • SHA512

    2a732675d2195509f97425b9b985bca2f774eace3b98e277264f409fe94177cc00553be743cae3ed3b4a4d6b609ceef5aea4c45c46615079ba43d7d76bd03efd

  • SSDEEP

    1536:Wqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6phl:Et1FYH+zi0ZbYe1g0ujyzdeh

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1944-1058-0x00000000003B0000-0x00000000003CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections