General

  • Target

    984-63-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • Sample

    230125-lw62xsff49

  • MD5

    043afe603da843d7f978d32725f3749e

  • SHA1

    ff2322e6bcb8de001bf30ef69916b092f816b193

  • SHA256

    4c0f0146db8a7d68ef2715775ea1a1beb4a0919e26b207b3296245783d1b49c5

  • SHA512

    83d9db444de54c5dbca1ed7743cce6447c128b908cbe75e24eb1432061647743a98838f4cde00d17254cf15eb6dc470a8739e7cc448a671e781efb748ec8c7b0

  • SSDEEP

    3072:MxqZWt1a2kX8frpmdBTefHFxhRvxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOum:iqZsrkvsxh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jancoy2

C2

5.75.172.247:11969

Attributes
  • auth_value

    d99aa526705f9370c4a8a76cdff52d12

Targets

    • Target

      984-63-0x0000000000400000-0x0000000000432000-memory.dmp

    • Size

      200KB

    • MD5

      043afe603da843d7f978d32725f3749e

    • SHA1

      ff2322e6bcb8de001bf30ef69916b092f816b193

    • SHA256

      4c0f0146db8a7d68ef2715775ea1a1beb4a0919e26b207b3296245783d1b49c5

    • SHA512

      83d9db444de54c5dbca1ed7743cce6447c128b908cbe75e24eb1432061647743a98838f4cde00d17254cf15eb6dc470a8739e7cc448a671e781efb748ec8c7b0

    • SSDEEP

      3072:MxqZWt1a2kX8frpmdBTefHFxhRvxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOum:iqZsrkvsxh

    Score
    1/10

MITRE ATT&CK Matrix

Tasks