General

  • Target

    1996-17-0x000000001AA50000-0x000000001AA6E000-memory.dmp

  • Size

    120KB

  • MD5

    b53ccdd853fc41b4422148e748d2f13e

  • SHA1

    5c3a3eb135db8b3b46bc7b5084b7ee1771234be4

  • SHA256

    89b5c5ee577bb1894497d7a5d07b3134147e62cae4299ed59700d73f9aad56d9

  • SHA512

    5aa0c22d8e65e6c77f36b57cd1b83102504057b14a1f45913f727b61f96d7ba6be3883e2dcbd8e11a0b4abecd3fc873ff9568f87c6dd3d5fcb2eaa957f3978d0

  • SSDEEP

    1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2w3tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdyY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.168.67.9:57395

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1996-17-0x000000001AA50000-0x000000001AA6E000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections