General

  • Target

    2876-317-0x00000000000D0000-0x00000000000EE000-memory.dmp

  • Size

    120KB

  • MD5

    76640412429292851105c1b239f58c18

  • SHA1

    fd175440756a51e1c67045cedeb3b0d192ef8aca

  • SHA256

    49ac96f2591c82d54bdb69531598d8fd52c36c07fd1c4c400000710e23564490

  • SHA512

    7c84cffc0d87775679ee17ae8f45c95bad6279127bfb4dd97102068e6e6e3d2c3c47e150307df32caadf0d098f112f5747333d943e3b9235aa46abf82c7c294b

  • SSDEEP

    1536:Cqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6p7l:gt1FYH+zi0ZbYe1g0ujyzde7

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2876-317-0x00000000000D0000-0x00000000000EE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections