General

  • Target

    3832-214-0x0000000000790000-0x00000000007C0000-memory.dmp

  • Size

    192KB

  • Sample

    231010-1ghs4scf9v

  • MD5

    af3e7e1c9dbe4761fdb4111fc7eb320d

  • SHA1

    5c3d62445e0998944fa51a0ad5229dba4e0185ff

  • SHA256

    e0dba27779a7b9ba163868ebc84d7ff7bec1538438e27cdd451db34630862d16

  • SHA512

    ae8bfe294aa0b0b8f57e9c015112a7969760f20595369f3ce90d049c8b75c2fbb04a335c923c7605d1b4d6f3b6e786b4ff23d6f79e4389c7ec32cb5c984f631a

  • SSDEEP

    3072:9ORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJ/8e8he:lSp3I0SbF/OVESYoqE0XmFue1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Targets

    • Target

      3832-214-0x0000000000790000-0x00000000007C0000-memory.dmp

    • Size

      192KB

    • MD5

      af3e7e1c9dbe4761fdb4111fc7eb320d

    • SHA1

      5c3d62445e0998944fa51a0ad5229dba4e0185ff

    • SHA256

      e0dba27779a7b9ba163868ebc84d7ff7bec1538438e27cdd451db34630862d16

    • SHA512

      ae8bfe294aa0b0b8f57e9c015112a7969760f20595369f3ce90d049c8b75c2fbb04a335c923c7605d1b4d6f3b6e786b4ff23d6f79e4389c7ec32cb5c984f631a

    • SSDEEP

      3072:9ORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJ/8e8he:lSp3I0SbF/OVESYoqE0XmFue1

    Score
    1/10

MITRE ATT&CK Matrix

Tasks