General

  • Target

    4592-132-0x00000000009D0000-0x00000000009EE000-memory.dmp

  • Size

    120KB

  • Sample

    220730-tt7vfacea9

  • MD5

    c6d460a24844c1dbb7b2008cb601c527

  • SHA1

    ff3f6e1572f07a32ea03f64c43be6ef6bb90768d

  • SHA256

    66f521be36ee3534c24e962cf3f04e6a189985d928a6bb759978beac3aeb3157

  • SHA512

    5e8152d8d3c77fc60cad32fc26ff2a5df87ca6997873a3a0ba0fea2ebce8877090465df806335ca50bbce07398ebfbe90c8b4cfa9f5bea78acaa9ecfc0c620b3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla29.07

C2

185.215.113.216:21921

Attributes
  • auth_value

    ce5605b2c036c2c3b7bdfb23dcf5f5a2

Targets

    • Target

      4592-132-0x00000000009D0000-0x00000000009EE000-memory.dmp

    • Size

      120KB

    • MD5

      c6d460a24844c1dbb7b2008cb601c527

    • SHA1

      ff3f6e1572f07a32ea03f64c43be6ef6bb90768d

    • SHA256

      66f521be36ee3534c24e962cf3f04e6a189985d928a6bb759978beac3aeb3157

    • SHA512

      5e8152d8d3c77fc60cad32fc26ff2a5df87ca6997873a3a0ba0fea2ebce8877090465df806335ca50bbce07398ebfbe90c8b4cfa9f5bea78acaa9ecfc0c620b3

    Score
    1/10

MITRE ATT&CK Matrix

Tasks