General

  • Target

    1600-243-0x0000000001040000-0x000000000105E000-memory.dmp

  • Size

    120KB

  • MD5

    7ddeeef8b5bf45a88c0dd0b344576619

  • SHA1

    64bfd65d3a46d35ba6a17bd3145bf67ad2c9349d

  • SHA256

    9f6c12ff40467d28f77e913cb150212ca62d9dd92cfabd727f1c5c1fe000affd

  • SHA512

    abd7296caf00d04a416cfb7583f8861b84e89e4a382c2716b3b333fb02572d5e27816a8529a808fa9209ec959099e9e532e9f75c32960388e26aa92619d133c7

  • SSDEEP

    1536:Cqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6pZl:gt1FYH+zi0ZbYe1g0ujyzdeZ

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-243-0x0000000001040000-0x000000000105E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections