General

  • Target

    Appliction.exe

  • Size

    95KB

  • MD5

    b507c738de9c352e7f112767e68d8b61

  • SHA1

    c8b21f9be7c3c573a230b80c77feba2402911e5e

  • SHA256

    079f272bda8ab07a78e4edcf7147eb5a8ca98cb53107c96a28454191866405ad

  • SHA512

    a5546974a985d5f71517c14189531f75646a40c13a5cc2c5f637b7e100cc6110eefc9a8c69693c47608d79de0b18629fc2988cb2b30df1dfa235cfa9ecfd996d

  • SSDEEP

    1536:Fqsgaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2T3teulgS6pQl:DfZeYP+zi0ZbYe1g0ujyzdfQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

5.tcp.eu.ngrok.io:15426

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Appliction.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections