General

  • Target

    1076-547-0x0000000001380000-0x00000000013D2000-memory.dmp

  • Size

    328KB

  • Sample

    240120-xtc7lsfde5

  • MD5

    55ad216f7d3a625524b7f92b5432b25c

  • SHA1

    c1e7c793c4c37b1b62c8cb9edbb58b71296cc5b5

  • SHA256

    5aba28d841ab6a13f426a9319b2be915e61d8cae5795dcc40a8c0f08e9631ddf

  • SHA512

    ba085c62dfce7f7e0c1507951fc1dab24e9d5d499884dbb01e886ca4bf4f2fef4a7c9edbc4b02abeffbda39d81b4af010d075a236e83e81e74f025a93b9c7df8

  • SSDEEP

    3072:62GLL3Y8QRrvRLsbMSNXmQogXIdilX+nupxQRmAgkVMRqT6Dv/YdeqiOL2bBOU:vobM+eilRxQEAXVMRqT6D4nL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Legaa

C2

185.172.128.33:38294

Targets

    • Target

      1076-547-0x0000000001380000-0x00000000013D2000-memory.dmp

    • Size

      328KB

    • MD5

      55ad216f7d3a625524b7f92b5432b25c

    • SHA1

      c1e7c793c4c37b1b62c8cb9edbb58b71296cc5b5

    • SHA256

      5aba28d841ab6a13f426a9319b2be915e61d8cae5795dcc40a8c0f08e9631ddf

    • SHA512

      ba085c62dfce7f7e0c1507951fc1dab24e9d5d499884dbb01e886ca4bf4f2fef4a7c9edbc4b02abeffbda39d81b4af010d075a236e83e81e74f025a93b9c7df8

    • SSDEEP

      3072:62GLL3Y8QRrvRLsbMSNXmQogXIdilX+nupxQRmAgkVMRqT6Dv/YdeqiOL2bBOU:vobM+eilRxQEAXVMRqT6D4nL

    Score
    1/10

MITRE ATT&CK Matrix

Tasks