General

  • Target

    2064-1403-0x0000000000810000-0x000000000082E000-memory.dmp

  • Size

    120KB

  • MD5

    711118f2510339a4253bd2a33ef23fae

  • SHA1

    402797df5c5d794c1320deb0ca602e0a382131fe

  • SHA256

    65618e08e4bbb2a0d04f2e37271d74746470142ea300300fc447376823145c1b

  • SHA512

    787ad9fe80afe4e86b15ee2bcd48939f7cb5e8d9f0c2ec24ffdd58d5d57e325408301716356e3385836e5fb94de2c8f10b3c249d71f3080f2d3cdcef98c88b19

  • SSDEEP

    1536:sqswXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2PHtmulgS6p3:6egzWHY3+zi0ZbYe1g0ujyzdOQ3

Malware Config

Extracted

Family

redline

Botnet

pixelnew

C2

194.49.94.11:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2064-1403-0x0000000000810000-0x000000000082E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections