General

  • Target

    2976-149-0x00000000001C0000-0x00000000001DC000-memory.dmp

  • Size

    112KB

  • Sample

    220911-yqsnkafhbj

  • MD5

    f5e6f2a358c3205a6ce82b201c1333ef

  • SHA1

    b21c1613ff5093ba0c9de735b0fed3270ba85b3b

  • SHA256

    daa27076aff3377ee5e58d0982b2c811f1821d31a60b16070c4474cd7c08a7bf

  • SHA512

    64f2aa9c217764967432b9fef911458f5762c2cb7138910e2b9643dd26f6d539b9adc33f9b46671aa0ecb56db6d5788dea83b7fa532a8e1b2859633130e33666

  • SSDEEP

    1536:uPqUPY5gyWjddJg3ZnubDNtieWDN+DNwNDaDNKiuRjyCYDN1jviDNPaQJ72oPMlI:J/u+eqOaJiJlyb3yCWLIp

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla.11.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    a1e5192e588aa983d678ceb4d6e0d8b5

Targets

    • Target

      2976-149-0x00000000001C0000-0x00000000001DC000-memory.dmp

    • Size

      112KB

    • MD5

      f5e6f2a358c3205a6ce82b201c1333ef

    • SHA1

      b21c1613ff5093ba0c9de735b0fed3270ba85b3b

    • SHA256

      daa27076aff3377ee5e58d0982b2c811f1821d31a60b16070c4474cd7c08a7bf

    • SHA512

      64f2aa9c217764967432b9fef911458f5762c2cb7138910e2b9643dd26f6d539b9adc33f9b46671aa0ecb56db6d5788dea83b7fa532a8e1b2859633130e33666

    • SSDEEP

      1536:uPqUPY5gyWjddJg3ZnubDNtieWDN+DNwNDaDNKiuRjyCYDN1jviDNPaQJ72oPMlI:J/u+eqOaJiJlyb3yCWLIp

    Score
    1/10

MITRE ATT&CK Matrix

Tasks