General

  • Target

    1428-58-0x0000000000070000-0x000000000008C000-memory.dmp

  • Size

    112KB

  • MD5

    be497e7beddccb62ae2497f97e3b9aad

  • SHA1

    5cfcda85219fee9a0312cdc2e132758fd940b803

  • SHA256

    7d13fc3d9844bfab75314bd58c10bc7472f3c6f17f15a75d86b818193389e4a9

  • SHA512

    8a1b9be6ad8eddc957fbfa11d0230d9e6f03ddc7e81dd1a5c497b91b3ebadce40341e32904cdbd5262b082bca15663ab14df72e3ae07defb4659687540ac760d

  • SSDEEP

    1536:yZJw9LhWKVhdsVQnwXPB+19m1VSKzawvbr+yuanhr/isZOGk:OJKdsVQwXPB+TczRtDnhr/i4O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla3.18.9

C2

185.215.113.216:21921

Attributes
  • auth_value

    af42ec3c2992d951ef41b056b1137d3b

Signatures

Files

  • 1428-58-0x0000000000070000-0x000000000008C000-memory.dmp
    .exe windows x86


    Headers

    Sections