General

  • Target

    1028-60-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • Sample

    220707-r4xq4sbcc5

  • MD5

    7a46c84f8a5e6f8c60528900fdef69c9

  • SHA1

    0540c5dfd279ecb1a90254cc63fa3d647fd6c89c

  • SHA256

    2128cf5cd958abb9605749ac49efb6d9b6108f37ebb028c07a86872505717528

  • SHA512

    94f19f520e51f824164e67f3052846f7becebf13629da5beb978b02c303b1bbeda92f1a85beca8ee95d77e11c644191d408480c76b97fb0085d941fb6785ccbe

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

OFFICE

C2

0.tcp.ngrok.io:15384

Targets

    • Target

      1028-60-0x0000000000400000-0x000000000041E000-memory.dmp

    • Size

      120KB

    • MD5

      7a46c84f8a5e6f8c60528900fdef69c9

    • SHA1

      0540c5dfd279ecb1a90254cc63fa3d647fd6c89c

    • SHA256

      2128cf5cd958abb9605749ac49efb6d9b6108f37ebb028c07a86872505717528

    • SHA512

      94f19f520e51f824164e67f3052846f7becebf13629da5beb978b02c303b1bbeda92f1a85beca8ee95d77e11c644191d408480c76b97fb0085d941fb6785ccbe

    Score
    1/10

MITRE ATT&CK Matrix

Tasks