General

  • Target

    1656-560-0x0000000000DA0000-0x0000000000DBE000-memory.dmp

  • Size

    120KB

  • MD5

    bd4bc19a416f1f4d29604e034a26b586

  • SHA1

    69e2ae4848e0aa50b91527d32afd4ed7115ff15c

  • SHA256

    293d1a5c2e0b1d233c4b6d4eaaa282bbdbaa57739583d8a222754d9913e43e52

  • SHA512

    3f2be8a398bbe3da4d956183edee74cf1c50f902927d226d116912f369515acaacce4d26b8a1325dd2989c3f8ac97324cacf23adf1f9ead1f76d70ee37543b81

  • SSDEEP

    1536:BqswXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2PHtmulgS6pK:vegzWHY3+zi0ZbYe1g0ujyzdOQK

Malware Config

Extracted

Family

redline

Botnet

pixelnew

C2

194.49.94.11:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1656-560-0x0000000000DA0000-0x0000000000DBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections