General

  • Target

    1168-54-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • Sample

    230702-3pgl5aea79

  • MD5

    bc40c8b4e28dd170f2561a5aefd130de

  • SHA1

    089a16e2a3e24fd2f7271068d0c03e591354e2eb

  • SHA256

    7425812a7f08b34a8dc11f0f8518a8d19eb90954dadd9b9ac4db02bedd746f6f

  • SHA512

    6c4ee4d2d77f7dbbd673f916fad68b446b9507b2185745c559e89ddb60c54dd3a4dc1e1b1db741215fddacd5752c82820e5818cbc9e69b879686035ec6828133

  • SSDEEP

    1536:3hbEey6y36sv0W7TDGOIrHuyk7xk2W5/uGxNFVYQffbuclGHQ4N0GkRP8e8h3:3lEebE6Cyk9i5/uGxNMS3azNM8e8h3

Malware Config

Extracted

Family

redline

Botnet

bruno

C2

83.97.73.134:19071

Attributes
  • auth_value

    b23e240c277e85ce9d49d6165c0a2b48

Targets

    • Target

      1168-54-0x0000000000280000-0x00000000002B0000-memory.dmp

    • Size

      192KB

    • MD5

      bc40c8b4e28dd170f2561a5aefd130de

    • SHA1

      089a16e2a3e24fd2f7271068d0c03e591354e2eb

    • SHA256

      7425812a7f08b34a8dc11f0f8518a8d19eb90954dadd9b9ac4db02bedd746f6f

    • SHA512

      6c4ee4d2d77f7dbbd673f916fad68b446b9507b2185745c559e89ddb60c54dd3a4dc1e1b1db741215fddacd5752c82820e5818cbc9e69b879686035ec6828133

    • SSDEEP

      1536:3hbEey6y36sv0W7TDGOIrHuyk7xk2W5/uGxNFVYQffbuclGHQ4N0GkRP8e8h3:3lEebE6Cyk9i5/uGxNMS3azNM8e8h3

    Score
    5/10
    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks