General

  • Target

    1252-509-0x0000000000FD0000-0x0000000000FEE000-memory.dmp

  • Size

    120KB

  • MD5

    89fed02c156839e1760c314d13e0f94e

  • SHA1

    5e88c20defa8526d1a7cebb897ab437b46d1c973

  • SHA256

    75728cb207c1eca1afaee24823632d2db8455e0c1da10385f89ea368b53ac60b

  • SHA512

    812eb23160b940efd125ee29de7459feecd7ff1d33ec7e83378efc7039dc18f97e5520d36c6f6d9eb82960a83727a4598c7b2fc77ac18036d811e6d8bd1121da

  • SSDEEP

    1536:HqswXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2PHtmulgS6pb:1egzWHY3+zi0ZbYe1g0ujyzdOQb

Malware Config

Extracted

Family

redline

Botnet

pixelnew

C2

194.49.94.11:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1252-509-0x0000000000FD0000-0x0000000000FEE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections