General

  • Target

    1620-2-0x00000000004A0000-0x00000000004C2000-memory.dmp

  • Size

    136KB

  • MD5

    00bda418308d8253ff6356ea6e2fed07

  • SHA1

    fedc847312da30002179c1c8e32f81851dba36cd

  • SHA256

    0d75f0e3784a1de839986484772c66b623d763ca8a38dee480cbfefbb6245219

  • SHA512

    ecf485eaa149e1ca5c413b2357fd9a8b9cab3b5831cdc07b82406a9a4bc72dc3a2e759a0f381ab6dabd7ed2d3baeec8f8ad00d4b556ca314ef8780ae3cf3ff6e

  • SSDEEP

    1536:kG6qTaoigHed/g8pT0NM0MTn3qIzDmYw4o8WDLVi8nJZcI3DvvjbuVGdynvryp/P:B3epgGb3q+DmYwXVi4wIzDynzyJdDrd

Score
10/10

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-2-0x00000000004A0000-0x00000000004C2000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections