General

  • Target

    1688-205-0x0000000000DF0000-0x0000000000E0E000-memory.dmp

  • Size

    120KB

  • MD5

    0c03fced18a9bd7bec2d3c7834ffaa01

  • SHA1

    4993e2f57d39fc77a109977dbbf5b73a433c822f

  • SHA256

    563d8600bb25f8e47d95e5ab9eb45efa80cd198646c856058e28348a0c363ef9

  • SHA512

    74f86c4f9d94453dd075bd13ed12b9c992074c776e06fbc80bc0dc1de186cd12866121569842db9caff8c1aced6cbee34444cdf96a5f6ef869e986f9cd1320f7

  • SSDEEP

    1536:zqskoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2atmulgS6ptl:ht1FYH+zi0ZbYe1g0ujyzdet

Malware Config

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-205-0x0000000000DF0000-0x0000000000E0E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections