General

  • Target

    1160-366-0x0000000000C90000-0x0000000000CAE000-memory.dmp

  • Size

    120KB

  • MD5

    274631a01b991e427df6ba9f46c0787f

  • SHA1

    e4d7be88fe7c284af019b57b7babf0994bb6152c

  • SHA256

    3e9096bec9aa2813f1c37e0a94bad91b3bc17c54ef4a12f09f6e5f4655dd8f44

  • SHA512

    b57532fd8b7018220b37f96efe63e6486ce2aaa7a0d8559c1cb6ba2da68bd8ef3fe93c0621d54eceb3a2f24b394f7da3c2c3e53e84c3111ca3ca2da1c59e9306

  • SSDEEP

    1536:Jqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6p/l:nt1FYH+zi0ZbYe1g0ujyzde/

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1160-366-0x0000000000C90000-0x0000000000CAE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections