General

  • Target

    2128-217-0x0000000001010000-0x000000000102E000-memory.dmp

  • Size

    120KB

  • MD5

    fcbaa28eed2386bcf5dcd61e10781843

  • SHA1

    7cb749bcaaba319c56f60f0abe013972736e833d

  • SHA256

    f9144ef7e73996857569b91bc9c8bb531d7d525295e4f5b4ae59216a6d556f7e

  • SHA512

    76fbb99377c8f9c3710a67f96972bfa10933bf385daa980a0f455ed45c84fb1a45dba38e37afa1ac2d590ea359ced074319cc3ab3c32a2d65099b050db855143

  • SSDEEP

    1536:iqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pql:At1FYH+zi0ZbYe1g0ujyzdeq

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2128-217-0x0000000001010000-0x000000000102E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections