General

  • Target

    2488-12-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    1ab26e358720a5c9083df3450eada510

  • SHA1

    93e1ea8e92382edd0da2621d5013af60220604e5

  • SHA256

    f3542ec099262500101cd7c39c0f527506a563a78c9ac120eae40a133d935b31

  • SHA512

    1b92c30c16bb520e7ce7f227fd0789702b9eb4397a5a01a63d1874f8f24ef7b2e534a149b33dd75c786270c0b210109c78877554c4ebf4d75d138a04a0977b1a

  • SSDEEP

    1536:hgqsWwqsz3lbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2QtmulgS6pQ:hOTPzFYr+zi0ZbYe1g0ujyzdcQ

Malware Config

Extracted

Family

redline

Botnet

@txtbaselinks

C2

91.92.252.103:61981

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2488-12-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections