General

  • Target

    1824-63-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    39f7738b4a88d12252652ad89d87146b

  • SHA1

    cf74997ddf28129c99682c63b6bc6d7490b0a0ca

  • SHA256

    96dfef1037edc1635d841e6f6d046c118b52f10df95b62cc73d71d9850d5f821

  • SHA512

    529894d8eee5710d563d436cd9d9a1e4df9b901dd2064f1d605c08857ba32494df679256a368bbce1fe0b47cca3116d795406e457cab2b7a7ed65e876e43cd4b

  • SSDEEP

    1536:Bqs+FRcqWClbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed2ttmulgS6p:veRclyY7+zi0ZbYe1g0ujyzd1

Malware Config

Extracted

Family

redline

Botnet

Invoice2100

C2

45.12.253.208:3030

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1824-63-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections