General

  • Target

    2580-523-0x00000000010B0000-0x00000000010CE000-memory.dmp

  • Size

    120KB

  • MD5

    89b54913e3a5ddde4b0cc40136a1ca39

  • SHA1

    700957b3141500220b6e21dc05bf296b6cb14be3

  • SHA256

    ed3faa0781f9a58454e53ca7c9671a63dad8b2db015ea1726d5bd03c4c50d319

  • SHA512

    b2cba73f9176d8c8bfdf28cbb8d1bc42598f9a9d2ac99b2536ed83a0c25a895a1bffdfebc262e9427c97ae133151ef0da13db710d88fe2d382b5f37d2f640fc1

  • SSDEEP

    1536:oqswXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2PHtmulgS6p8:GegzWHY3+zi0ZbYe1g0ujyzdOQ8

Malware Config

Extracted

Family

redline

Botnet

pixelnew

C2

194.49.94.11:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2580-523-0x00000000010B0000-0x00000000010CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections