General

  • Target

    2880-1044-0x0000000000FF0000-0x000000000100E000-memory.dmp

  • Size

    120KB

  • MD5

    37cba2a852b7cb8b6102c34a82442027

  • SHA1

    79745807102b3ce89e0cd051f0450e25ba0c10ae

  • SHA256

    d38952344b32eb7efba32d2db77493937a37512516e6b5d2fda3a0dea71d3d36

  • SHA512

    c0544d8ae39bbdb3558f9a4c83686cb165bd0eb1c81fb241abccc8c8685ea899fefc18a53914d846e16b0538c39f5a487c5baf1af86cc67d6351ff4a63aed953

  • SSDEEP

    1536:ZqswXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2PHtmulgS6p9:3egzWHY3+zi0ZbYe1g0ujyzdOQ9

Malware Config

Extracted

Family

redline

Botnet

pixelnew

C2

194.49.94.11:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2880-1044-0x0000000000FF0000-0x000000000100E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections