General

  • Target

    800-146-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    923e39de928b5c5fa664bf484cb0bef9

  • SHA1

    66baf6daaf63d9e34de2508d9bb2050484353c42

  • SHA256

    f4b941a620c422c85e5564009a1773bfd97b893318d869601abb9a8d4b8c5ae0

  • SHA512

    4b157ba9bd8d2212eff406bc60687982be6b911e0450ebb2650f0917d723cbcd18d4d158cb60b5280d9594147f59db0a41f60588a268b86f7d1aedec8860ec5b

  • SSDEEP

    1536:xqs+jlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2WteulgS6pk:f2UeYr+zi0ZbYe1g0ujyzdOk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Roly

C2

87.120.88.63:65012

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 800-146-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections