General

  • Target

    2544-18-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    2e89db199d1085efeb2ee46c28af55ce

  • SHA1

    a6c571b7ab37acb0f1ad6c6acd1fb357d3fad7f0

  • SHA256

    61987b15970f35c6e9f8c049bcd2b9122c9c6e24c597e9dac1770241a5d58e0d

  • SHA512

    fb2875ae16e21fe1fcc6105e510cc2265d413f02edde734cfec3608fc5d9fa0df3ad302d20e370ca9d21cf7c185d5b11cc54a365b3f58539d429d1f4aad06a11

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2n3teulgS6p:rAMOY3+zi0ZbYe1g0ujyzd7

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.146:55615

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2544-18-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections