General

  • Target

    4540-114-0x00000000001A0000-0x00000000001D0000-memory.dmp

  • Size

    192KB

  • Sample

    230911-gmt9jseb28

  • MD5

    f076d509aed3a975b847503670e32926

  • SHA1

    90c1ee3ee57be8799b78fffb6b2a7a0210f5b2a7

  • SHA256

    09f2fd6bf66550acdbab0af3f2fdcd66c307f2d7d9fb784ad2439324c79bcc05

  • SHA512

    ea98ed04960fa99918eac3f07c886b440e721b8ccb408ad1967df6b6ba14379ce757d6adedb1a9e1547e6e13b13d69c389457942a9bb4e2bf9d94673b00ad811

  • SSDEEP

    3072:z5HNeuCLI0SsHTAOvs4eY6zOaE0+iS30OWoJl8e8hw:tH+LI0SsHTj6zOaE0o0OWoT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

amadey_api

C2

amadapi.tuktuk.ug:11290

Attributes
  • auth_value

    a004bea47cf55a1c8841d46c3fe3e6f5

Targets

    • Target

      4540-114-0x00000000001A0000-0x00000000001D0000-memory.dmp

    • Size

      192KB

    • MD5

      f076d509aed3a975b847503670e32926

    • SHA1

      90c1ee3ee57be8799b78fffb6b2a7a0210f5b2a7

    • SHA256

      09f2fd6bf66550acdbab0af3f2fdcd66c307f2d7d9fb784ad2439324c79bcc05

    • SHA512

      ea98ed04960fa99918eac3f07c886b440e721b8ccb408ad1967df6b6ba14379ce757d6adedb1a9e1547e6e13b13d69c389457942a9bb4e2bf9d94673b00ad811

    • SSDEEP

      3072:z5HNeuCLI0SsHTAOvs4eY6zOaE0+iS30OWoJl8e8hw:tH+LI0SsHTj6zOaE0o0OWoT

    Score
    1/10

MITRE ATT&CK Matrix

Tasks