General

  • Target

    3612-1418-0x00000000009F0000-0x0000000000E68000-memory.dmp.exe

  • Size

    4.5MB

  • MD5

    e24baa016c4432a863aa8b097412f527

  • SHA1

    4f3998fa9e291c48b199fb4a2a8230628c444581

  • SHA256

    8458a3c7d3f61a95d4611b00d7823832cc49f82c82ef0abb8397b916331a4453

  • SHA512

    07c8a61503b7c057356a37e3efe2a617eaaa16a1c8e8faeb0c35f197f50f0676a356db209a8236dcf5a653beb57254b534236eab1cf6714d63b231091eb4a9b0

  • SSDEEP

    49152:FRrBR6Yu++dcVlRy6BP+ytvgP6uUZJPqyhWzXRU6l3rIDUmGhgscIa:FRNR6Yu+rRyULtvgPqFFIlcDUBa/I

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Signatures

  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3612-1418-0x00000000009F0000-0x0000000000E68000-memory.dmp.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections