General

  • Target

    668-285-0x00000000003E0000-0x00000000003FE000-memory.dmp

  • Size

    120KB

  • MD5

    74bc6deae12ef17034e4912862c0bdd8

  • SHA1

    a3075ed9c05a800ba17d840588c75912f7378f01

  • SHA256

    3a0b7f28909c98e935ff009c09b3a99fe0b258d1d01f968661a4c5dda3d441d0

  • SHA512

    5a67140ab6ff198be090febf050678a8479b5f7f6ec310e357a9ded5b4b56058ec1d753137e5ed9b3399753c154ef6ccdf1820c0e6486e32004a125e3b77b5e4

  • SSDEEP

    1536:Qqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pWl:+t1FYH+zi0ZbYe1g0ujyzdeW

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 668-285-0x00000000003E0000-0x00000000003FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections