General

  • Target

    3696-171-0x0000000000730000-0x000000000074C000-memory.dmp

  • Size

    112KB

  • MD5

    20916681c7d0d7597666f153be43457a

  • SHA1

    1e1ee67d4863ef7566bae5403cbd584b3926950e

  • SHA256

    42d6f7cdf8fac096e18b62fc931eec2183045b0fb088c0f014840a34a29cbbbf

  • SHA512

    5fd9da38b4a0934dbc747ccb763c0e53ac230d742e5c772a156152384d557281045e8092fbe2aa1a5915429dbf3c1431bba1d7222ffabb9f0b2f1941c47b34c6

  • SSDEEP

    1536:OPqUPY5QyWjddJg3JqQbDeh+yWDNWDNhNDxDNJiugjyCrDN1JvvDNPslJ7m1JUy0:pikXyADjYiwN+ADb8xIX

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla.18.9

C2

185.215.113.216:21921

Attributes
  • auth_value

    d571a99ea018ea37bb80eca1ffdd7368

Signatures

Files

  • 3696-171-0x0000000000730000-0x000000000074C000-memory.dmp
    .exe windows x86


    Headers

    Sections