General

  • Target

    968-58-0x0000000000070000-0x000000000008C000-memory.dmp

  • Size

    112KB

  • Sample

    220916-jvc2cafag6

  • MD5

    6ebf8d8bcd2a9dd8dc065d5c0f9a06c8

  • SHA1

    515bbe09bb2026b4d82adad678c16e74dbc4d6f9

  • SHA256

    21c75276f56b6166eb9130545cd3878105c2ebd4e324587073b9bdc2600f1ea6

  • SHA512

    8d5c667904cd8de27d938ca22bfad1d2883332c6aa4e252d8b1d287c465d453cccae44a56004cb3d2a86d8e76b656cc96bc9b0f39181976ac8a5fb040ca44a68

  • SSDEEP

    1536:hPqUPY5AyWjddJg3ZD+bDZJm6WDNWDN5ND2DNOiutjyCYDN1eveDNPlUJ7WjlKUn:4r+q6Tex2ij8x27CGbDhxQI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla3.12.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    893298c4bebea403e4a59dd151c4fcc2

Targets

    • Target

      968-58-0x0000000000070000-0x000000000008C000-memory.dmp

    • Size

      112KB

    • MD5

      6ebf8d8bcd2a9dd8dc065d5c0f9a06c8

    • SHA1

      515bbe09bb2026b4d82adad678c16e74dbc4d6f9

    • SHA256

      21c75276f56b6166eb9130545cd3878105c2ebd4e324587073b9bdc2600f1ea6

    • SHA512

      8d5c667904cd8de27d938ca22bfad1d2883332c6aa4e252d8b1d287c465d453cccae44a56004cb3d2a86d8e76b656cc96bc9b0f39181976ac8a5fb040ca44a68

    • SSDEEP

      1536:hPqUPY5AyWjddJg3ZD+bDZJm6WDNWDN5ND2DNOiutjyCYDN1eveDNPlUJ7WjlKUn:4r+q6Tex2ij8x27CGbDhxQI

    Score
    3/10

MITRE ATT&CK Matrix

Tasks