General

  • Target

    4712-350-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • Sample

    220902-pvnqqsgda2

  • MD5

    f4a0a7e4e6b85307c3c8c0d23ec2ca4c

  • SHA1

    fcbc56591450f304f2547d3609a190cae247f3d0

  • SHA256

    70d2e3e250518e6a045e96bff877ad8e9782d099f2e0cde29138441a4e15071e

  • SHA512

    8d01998fa22be1a7cfa4615e8f3a561074b24da1bd61769027dafab796b1e40eef27f530f34ebbef3f741acf5d1d2ab0304f8a2d4ec5800d49c4a1e58c682af3

  • SSDEEP

    3072:DcvFBACY6piwIxvJTxYlWx0LQcHhjDkh74EASNG:DcveJ5YlA0kctkh74jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3108_RUZKI

C2

213.219.247.199:9452

Attributes
  • auth_value

    f71fed1cd094e4e1eb7ad1c53e542bca

Targets

    • Target

      4712-350-0x0000000000400000-0x0000000000420000-memory.dmp

    • Size

      128KB

    • MD5

      f4a0a7e4e6b85307c3c8c0d23ec2ca4c

    • SHA1

      fcbc56591450f304f2547d3609a190cae247f3d0

    • SHA256

      70d2e3e250518e6a045e96bff877ad8e9782d099f2e0cde29138441a4e15071e

    • SHA512

      8d01998fa22be1a7cfa4615e8f3a561074b24da1bd61769027dafab796b1e40eef27f530f34ebbef3f741acf5d1d2ab0304f8a2d4ec5800d49c4a1e58c682af3

    • SSDEEP

      3072:DcvFBACY6piwIxvJTxYlWx0LQcHhjDkh74EASNG:DcveJ5YlA0kctkh74jS

    Score
    1/10

MITRE ATT&CK Matrix

Tasks