General

  • Target

    1260-10-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    ff58153d85e3b13d4d3c62f88127b40f

  • SHA1

    f49dcc720273f196551717ae444205b4e9ded804

  • SHA256

    f7fe202579ec9a9f05eeceecf389dea160827bc8b325387460f67d88db01b6c2

  • SHA512

    983c9045ec9db458d122dbdbeab9c850b51e080d49f581ded5dccca43fbc301ffc3926934111d08cdc48389a5d47b7a25881338664b3120ec1185cefb50987aa

  • SSDEEP

    1536:hgqsWwqsz3lbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2QtmulgS6p:hOTPzFYr+zi0ZbYe1g0ujyzdc

Malware Config

Extracted

Family

redline

Botnet

@txtbaselinks

C2

91.92.252.103:61981

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1260-10-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections