General

  • Target

    2296-147-0x0000000000D80000-0x0000000000D9C000-memory.dmp

  • Size

    112KB

  • Sample

    220915-3ly21aaahr

  • MD5

    8605fbd661ecdeed1d8d455929b843b8

  • SHA1

    58081cde9b5418654712cfb470d5dfd266869237

  • SHA256

    c7e355d122646a223352c4ef111d2fbc313598313bcfb1eceeb348e33c2e22de

  • SHA512

    c6e79076c0402b120779b1f46dd51bb8cc9575a5758d00dd273486790a67a8d53decfe0f71d5f5688b364f9189185b2adcc8399391bce8a83fae798b4e57d616

  • SSDEEP

    1536:hPqUPY5AyWjddJg3ZD+bDZJm6WDNWDN5ND2DNOiutjyCYDN1eveDNPlUJ7WjlKUY:4r+q6Tex2ij8x27CGbDhxQIu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla3.12.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    893298c4bebea403e4a59dd151c4fcc2

Targets

    • Target

      2296-147-0x0000000000D80000-0x0000000000D9C000-memory.dmp

    • Size

      112KB

    • MD5

      8605fbd661ecdeed1d8d455929b843b8

    • SHA1

      58081cde9b5418654712cfb470d5dfd266869237

    • SHA256

      c7e355d122646a223352c4ef111d2fbc313598313bcfb1eceeb348e33c2e22de

    • SHA512

      c6e79076c0402b120779b1f46dd51bb8cc9575a5758d00dd273486790a67a8d53decfe0f71d5f5688b364f9189185b2adcc8399391bce8a83fae798b4e57d616

    • SSDEEP

      1536:hPqUPY5AyWjddJg3ZD+bDZJm6WDNWDN5ND2DNOiutjyCYDN1eveDNPlUJ7WjlKUY:4r+q6Tex2ij8x27CGbDhxQIu

    Score
    3/10

MITRE ATT&CK Matrix

Tasks