General

  • Target

    2932-289-0x0000000000AC0000-0x0000000000ADE000-memory.dmp

  • Size

    120KB

  • MD5

    a6407c98018da58b310e3efa2c917197

  • SHA1

    c1e656ce64ed1e49e588f57a854afdc03b231184

  • SHA256

    55911db261e11213c3c896435960ca0a6cb2fbcd05331a813a1c992b4ab78d16

  • SHA512

    b378f19ee2dc128c93425281f99d8b88ffa1688944397ef33e20c1b8937ce94d8cecd3d02a0eb4228a01cf23f505179d30fd3c92761a35aec38e9b65b437834c

  • SSDEEP

    1536:Yqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6psl:2t1FYH+zi0ZbYe1g0ujyzdes

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2932-289-0x0000000000AC0000-0x0000000000ADE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections