General

  • Target

    2168-252-0x0000000000B30000-0x0000000000B4E000-memory.dmp

  • Size

    120KB

  • MD5

    c7ec9730175863335419531e66590d20

  • SHA1

    38884c6fd35b2effa6b3a2f9605d694542976315

  • SHA256

    d7ab6b8d42318286a410025b823726cb8de411c9f7f48de93cf8d960fca57541

  • SHA512

    2653ed5059026e30daab4f6a548d66b136d5f0301ebbdf045401c7446394ed26b3a685ae4009010ab3f9999188605b69b05cd7876461928b34271d3ba2a950d0

  • SSDEEP

    1536:pqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6ppl:Ht1FYH+zi0ZbYe1g0ujyzdep

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2168-252-0x0000000000B30000-0x0000000000B4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections