General

  • Target

    316-62-0x0000000000BE0000-0x0000000001046000-memory.dmp

  • Size

    4.4MB

  • MD5

    dda63e6cc0f6892d0f6c8349df15a550

  • SHA1

    739bb151e61e1e6ea231fbdc82f6e313ca05ebee

  • SHA256

    60134057d7bf44ed679fd67067d3337851c44b9729be53b263c7d3f57e81e1a1

  • SHA512

    dc7af6f4a5e62da6277db200a9011fdf28ce008ca9518ab81c4d274b62a7042137b2970b5c121fec97fd7ec5dac2d7950de7419c6054972264957485aaf8ccff

  • SSDEEP

    98304:TFyNGxSZxcyj8n8VUJC1sAlI7bbdMnHG:3i8n8A4si8pSG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Signatures

  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 316-62-0x0000000000BE0000-0x0000000001046000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections