General

  • Target

    2028-58-0x0000000000080000-0x000000000009E000-memory.dmp

  • Size

    120KB

  • MD5

    4190553f547ed52de78ba2791e3fb8c5

  • SHA1

    92b083973eb63684f1ddfffaf8b27b6f4ff4d21c

  • SHA256

    a673b964d3565b4bb833abd5ce63c8ec006b5a050b8574283d283ee38088e05e

  • SHA512

    422c19a13ed6c54821df7002a31f8e92194e93164a6e7aed568a1239b33c69f3662e5ec226d87e32be1a88c8d9c6497851895991f7e605868f60b084da6838c3

  • SSDEEP

    1536:D2vLjr/Wg/nLhmVYQtFOKGbrUGpV/aXgyDnGeNr/qNmwzwPx0X:4zOg/nLUVmKShf/aXgyDnGeNr/qIwzz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla.04.08

C2

185.215.113.216:21921

Attributes
  • auth_value

    7f2bf6f810414d0f2fc0b3b8d54a76ac

Signatures

Files

  • 2028-58-0x0000000000080000-0x000000000009E000-memory.dmp
    .exe windows x86


    Headers

    Sections