General

  • Target

    1532-55-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • Sample

    230327-11r6wsfe52

  • MD5

    37baf6f2b3c685e1b74e46a4064df480

  • SHA1

    75b71b6ffe2beda068d16637b44fd376f3ac640d

  • SHA256

    f0d967b3bed33ff86dc36190c07c34bf3f6b54549067bee2c7877d1d4c03d6ec

  • SHA512

    9e38dfa6d2af46cc681f05977e3e68f7d37387e9e768a3db730794c96ed73ec7b5df3669d8bf33b53201877d2d94cee7080d774c29ba712474c7a80865ead626

  • SSDEEP

    3072:BxqZWjHaJIppUJbz1coeL5JVhSTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOup:zqZ3JbzebVh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

pushka7

C2

176.123.9.142:14845

Attributes
  • auth_value

    630452b2bed54a95b6c67c741b1c401a

Targets

    • Target

      1532-55-0x0000000000400000-0x0000000000432000-memory.dmp

    • Size

      200KB

    • MD5

      37baf6f2b3c685e1b74e46a4064df480

    • SHA1

      75b71b6ffe2beda068d16637b44fd376f3ac640d

    • SHA256

      f0d967b3bed33ff86dc36190c07c34bf3f6b54549067bee2c7877d1d4c03d6ec

    • SHA512

      9e38dfa6d2af46cc681f05977e3e68f7d37387e9e768a3db730794c96ed73ec7b5df3669d8bf33b53201877d2d94cee7080d774c29ba712474c7a80865ead626

    • SSDEEP

      3072:BxqZWjHaJIppUJbz1coeL5JVhSTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOup:zqZ3JbzebVh

    Score
    1/10

MITRE ATT&CK Matrix

Tasks