General

  • Target

    5504-317-0x0000000004960000-0x0000000004990000-memory.dmp

  • Size

    192KB

  • Sample

    231010-187ljshb55

  • MD5

    18c35c17b77d8f5dc5f081415a5144cb

  • SHA1

    99ee7cf5f1ae5a529fc91f6174df9327fa01f8fd

  • SHA256

    3ca27525cb7c7e5673e2fd542d48384448ff8749e84b38c4b00cb78573b9b6e6

  • SHA512

    dce1b8eedb83d564890f3c17b2ae4b237a642e0aca873539def45a5c676f93ed731b2ec1ec67942c4efb56d11416fb257cd3c87da02e4854a4f357a9c7b3bc55

  • SSDEEP

    3072:WORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJC8e8he:CSp3I0SbF/OVESYoqE0XmFueE

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Targets

    • Target

      5504-317-0x0000000004960000-0x0000000004990000-memory.dmp

    • Size

      192KB

    • MD5

      18c35c17b77d8f5dc5f081415a5144cb

    • SHA1

      99ee7cf5f1ae5a529fc91f6174df9327fa01f8fd

    • SHA256

      3ca27525cb7c7e5673e2fd542d48384448ff8749e84b38c4b00cb78573b9b6e6

    • SHA512

      dce1b8eedb83d564890f3c17b2ae4b237a642e0aca873539def45a5c676f93ed731b2ec1ec67942c4efb56d11416fb257cd3c87da02e4854a4f357a9c7b3bc55

    • SSDEEP

      3072:WORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJC8e8he:CSp3I0SbF/OVESYoqE0XmFueE

    Score
    1/10

MITRE ATT&CK Matrix

Tasks