General

  • Target

    2104-97-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • Sample

    230706-sat9kacd28

  • MD5

    273bc0e4d17524e69179a41adce92371

  • SHA1

    6b34522f0468eb54a3e494cae1ea6cb454883e58

  • SHA256

    ea20bb668b08c820dac0fdd074e12ed6565692aa5ae053cda0934be55b0564e7

  • SHA512

    cc19772f5ba36df4d7cb7505bf9eae654a95a0b3cdd9671782885033c7b33030c5cab150e2f5bb135d7e7c723b63c5762d4f9420f1d3ed17a749c3a8f0d7b62e

  • SSDEEP

    3072:YN9zgaHeuGhriktrBxN3kuZ+zdzI8e8hj:29Ie4rhTodzI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Targets

    • Target

      2104-97-0x0000000000270000-0x00000000002A0000-memory.dmp

    • Size

      192KB

    • MD5

      273bc0e4d17524e69179a41adce92371

    • SHA1

      6b34522f0468eb54a3e494cae1ea6cb454883e58

    • SHA256

      ea20bb668b08c820dac0fdd074e12ed6565692aa5ae053cda0934be55b0564e7

    • SHA512

      cc19772f5ba36df4d7cb7505bf9eae654a95a0b3cdd9671782885033c7b33030c5cab150e2f5bb135d7e7c723b63c5762d4f9420f1d3ed17a749c3a8f0d7b62e

    • SSDEEP

      3072:YN9zgaHeuGhriktrBxN3kuZ+zdzI8e8hj:29Ie4rhTodzI

    Score
    1/10

MITRE ATT&CK Matrix

Tasks