General

  • Target

    1508-265-0x00000000002E0000-0x00000000002FE000-memory.dmp

  • Size

    120KB

  • MD5

    5621c5747138e8d203227a4456a3d295

  • SHA1

    f2548b11d0e45f92c13012851557e1508f3d5a5d

  • SHA256

    6b4d78f67c1fd8b6a9b09cafd7266d454d4302235f32ab4a6714f7d7e6c62715

  • SHA512

    df6589b5273275ed46afe4838b4b4c7c57915809e16b803a9ac9288df4916ca09177381b8083b6fa57a5639cbeee79b1447916e39a52bc8b5493f2da692f888e

  • SSDEEP

    1536:Yqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pGl:2t1FYH+zi0ZbYe1g0ujyzdeG

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1508-265-0x00000000002E0000-0x00000000002FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections