General

  • Target

    1984-249-0x0000000001050000-0x000000000106E000-memory.dmp

  • Size

    120KB

  • MD5

    373797f68946bc0ca78834e970cee819

  • SHA1

    8d9caee3948811034a54dd33f95c6458071f6126

  • SHA256

    acadf2152c10af2e326dbfd07b1f4cb71ed9cd5aaf380ba9a6f2cdf602807c75

  • SHA512

    c93b3f415a71297cb2448ea344bf8c6db2e82a62fd12f77aba1889fc9b5d8a36c4028005c1b03a41f0da03173e0c36e190baa60b8a3b93e419f784d8505c7d74

  • SSDEEP

    1536:Eqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pGl:Ct1FYH+zi0ZbYe1g0ujyzdeG

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1984-249-0x0000000001050000-0x000000000106E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections