General

  • Target

    2064-191-0x0000000000BB0000-0x0000000000BCE000-memory.dmp

  • Size

    120KB

  • MD5

    93e9b29c665f32765bd9a16f625eb181

  • SHA1

    33b743e31319e400fbfe63830cc4f75c33f9ec69

  • SHA256

    ddb73930e424ec3d20db338aa83d5e050b57b096711ec4f551ddfbd505515ef7

  • SHA512

    9cd599d6492f271bd1c4422da32b330c353a1d34b2e8d17ed76916920a01ab8d0068a14cc90703de66804c4113a9113694154e1462f07ca309adf5a79dfb56db

  • SSDEEP

    1536:pqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6phl:Ht1FYH+zi0ZbYe1g0ujyzdeh

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2064-191-0x0000000000BB0000-0x0000000000BCE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections