General

  • Target

    3588-165-0x00000000001D0000-0x00000000001EC000-memory.dmp

  • Size

    112KB

  • MD5

    dd0bf1e238ccf4cdc675e209d921e920

  • SHA1

    799293531f4769f2d2fed77a75fcc4924565ac32

  • SHA256

    1c965c9b8242d4975ea8a0affe514d6c7695bfb86a921ec96cdf1d416f5c3538

  • SHA512

    1ab8fedc4010ac323ae03221b583498fa9a10fd1c7e4b977507cd8bfac21a93cbdc2e51e5e9b813c45419ecac6de17e9f114b2f7dfe320f293307955e8f9acab

  • SSDEEP

    3072:oJCGpEsGGN1t1d9aWog/4jFsYdTCqa/NRB:oJj8GN3f

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla.17.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    24d8e4d0b3a414bc499b352c6f4fa44e

Signatures

Files

  • 3588-165-0x00000000001D0000-0x00000000001EC000-memory.dmp
    .exe windows x86


    Headers

    Sections