General

  • Target

    4376-4-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    62b53baa11ef2645a647f1fe8434f070

  • SHA1

    2dc7e6a2840761fe42adce2c275e5132cbcf2b1e

  • SHA256

    7cbf052752059e28f20e19a1733caa0ffdf6ecc2d20be0588a7a5d68f475f32f

  • SHA512

    787bc0d9562b04c041dc44f694c148c8da303194f80de265d98affd35cdf1e3481666b06abc7ab3a828e19c3e298f94a2ec2757b8bfe2ba89bcead0234d5cacf

  • SSDEEP

    1536:9qsCNqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2kteulgS6pY:rOMOY3+zi0ZbYe1g0ujyzdsY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

hyce

C2

193.70.111.186:13484

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4376-4-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections