General

  • Target

    968-58-0x0000000000070000-0x000000000008C000-memory.dmp

  • Size

    112KB

  • MD5

    6ebf8d8bcd2a9dd8dc065d5c0f9a06c8

  • SHA1

    515bbe09bb2026b4d82adad678c16e74dbc4d6f9

  • SHA256

    21c75276f56b6166eb9130545cd3878105c2ebd4e324587073b9bdc2600f1ea6

  • SHA512

    8d5c667904cd8de27d938ca22bfad1d2883332c6aa4e252d8b1d287c465d453cccae44a56004cb3d2a86d8e76b656cc96bc9b0f39181976ac8a5fb040ca44a68

  • SSDEEP

    1536:hPqUPY5AyWjddJg3ZD+bDZJm6WDNWDN5ND2DNOiutjyCYDN1eveDNPlUJ7WjlKUn:4r+q6Tex2ij8x27CGbDhxQI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla3.12.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    893298c4bebea403e4a59dd151c4fcc2

Signatures

Files

  • 968-58-0x0000000000070000-0x000000000008C000-memory.dmp
    .exe windows x86


    Headers

    Sections