General

  • Target

    2028-58-0x0000000000080000-0x000000000009E000-memory.dmp

  • Size

    120KB

  • Sample

    220809-t6cvtsefd4

  • MD5

    4190553f547ed52de78ba2791e3fb8c5

  • SHA1

    92b083973eb63684f1ddfffaf8b27b6f4ff4d21c

  • SHA256

    a673b964d3565b4bb833abd5ce63c8ec006b5a050b8574283d283ee38088e05e

  • SHA512

    422c19a13ed6c54821df7002a31f8e92194e93164a6e7aed568a1239b33c69f3662e5ec226d87e32be1a88c8d9c6497851895991f7e605868f60b084da6838c3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla.04.08

C2

185.215.113.216:21921

Attributes
  • auth_value

    7f2bf6f810414d0f2fc0b3b8d54a76ac

Targets

    • Target

      2028-58-0x0000000000080000-0x000000000009E000-memory.dmp

    • Size

      120KB

    • MD5

      4190553f547ed52de78ba2791e3fb8c5

    • SHA1

      92b083973eb63684f1ddfffaf8b27b6f4ff4d21c

    • SHA256

      a673b964d3565b4bb833abd5ce63c8ec006b5a050b8574283d283ee38088e05e

    • SHA512

      422c19a13ed6c54821df7002a31f8e92194e93164a6e7aed568a1239b33c69f3662e5ec226d87e32be1a88c8d9c6497851895991f7e605868f60b084da6838c3

    Score
    1/10

MITRE ATT&CK Matrix

Tasks