General

  • Target

    2568-11-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    a4e57348608b62c72ef20cdcbd92e45d

  • SHA1

    a3c3fc0e875368b1194e3abe8094bf6618e65977

  • SHA256

    f29488747d21e2844e90979ccb3dcfee9d37a4fd5ea167da5e5afd39dc3ae945

  • SHA512

    04782f41bb4250983685ac6aa71dc1e71056aec90d879819fa899ac4051092b22f1d21f2bed04c069c30d7a695f6ef3cc0ff641fd7d4fe41ae170657b9b8384c

  • SSDEEP

    1536:VqsG5qeUlbG6jejoigI843Ywzi0Zb78ivombfexv0ujXyyed2KtmulgS6p:TqlMY8+zi0ZbYe1g0ujyzd2

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

195.10.205.79:30525

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2568-11-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections