General

  • Target

    4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp

  • Size

    328KB

  • Sample

    240112-nx4djagae9

  • MD5

    943033c3a7f1ddc16795befbd8273cd4

  • SHA1

    f9401a48eb6c27bab89b49c77ad74894c0e7b82b

  • SHA256

    0a4e248847be373da7f6d9a288f8728b0fc0317a1099e0762e0278f59db0b303

  • SHA512

    470dfbde37993a6b9b87a2a0c519620ed20570123fb16d16da5fe46114ba7453c6946a1ef94d671e63f0afc457b894b5aea49a2ebe808239aa64d1d11adc4266

  • SSDEEP

    3072:wcsqexnfF9k4fr+XwMK2sbAOIUdGHl8JH3QqY3nPrveWrNxk0QcadS2gMRqTjDv+:rdMdk2ktxkFcaAXMRqTjD4EL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.172.128.33:38294

Targets

    • Target

      4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp

    • Size

      328KB

    • MD5

      943033c3a7f1ddc16795befbd8273cd4

    • SHA1

      f9401a48eb6c27bab89b49c77ad74894c0e7b82b

    • SHA256

      0a4e248847be373da7f6d9a288f8728b0fc0317a1099e0762e0278f59db0b303

    • SHA512

      470dfbde37993a6b9b87a2a0c519620ed20570123fb16d16da5fe46114ba7453c6946a1ef94d671e63f0afc457b894b5aea49a2ebe808239aa64d1d11adc4266

    • SSDEEP

      3072:wcsqexnfF9k4fr+XwMK2sbAOIUdGHl8JH3QqY3nPrveWrNxk0QcadS2gMRqTjDv+:rdMdk2ktxkFcaAXMRqTjD4EL

    Score
    1/10

MITRE ATT&CK Matrix

Tasks