General

  • Target

    1136-533-0x00000000013D0000-0x00000000013EE000-memory.dmp

  • Size

    120KB

  • MD5

    890756790d04b13ed6c0d942c3d7c5c5

  • SHA1

    408217350a5bccb3541b3fc1c7a033c29faee4eb

  • SHA256

    ea8b12fb8e6c202bcee5e9e82cfd25cd8c4fb882922a040a8ba8337226f93b26

  • SHA512

    d6ba328fe96224b64fda5d4044785a586fd1c33b1edbc3fe8f881f499c208ff4360d4275c78acf6eb4f026aceeef115bdf31c53c4eb10594806b93fc58d5c73f

  • SSDEEP

    1536:TqswXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2PHtmulgS6p+:BegzWHY3+zi0ZbYe1g0ujyzdOQ+

Malware Config

Extracted

Family

redline

Botnet

pixelnew

C2

194.49.94.11:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1136-533-0x00000000013D0000-0x00000000013EE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections