General

  • Target

    3020-329-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • Sample

    240123-c1swesfadm

  • MD5

    66801d4d9be04b2d333b204cb9d12137

  • SHA1

    0ce5e09bd2e6bf7bdb3892e2599d418902808be9

  • SHA256

    35a638665971b46f92cec6cb948debe25d170671770d3c38d36fa0e1b7f9d027

  • SHA512

    bf5c127cc603a99ef6a1891eb3065f9c8807b0b232a1097bf178a39b0309073188afc5c72a8ef2a02154643875f3493454f98d22487ce6e9eaff4b09d84c89d9

  • SSDEEP

    3072:RcyqhnyFgELfJUkwAKQmrAOYE2ViJH3Q9dznO5NxzHs4cadS2gMRqTjDv/Yneqi5:uO5E1fx7tcaAXMRqTjD4pL

Malware Config

Extracted

Family

redline

Botnet

@RLREBORN Cloud TG: @FATHEROFCARDERS)

C2

141.95.211.148:46011

Targets

    • Target

      3020-329-0x0000000000400000-0x0000000000452000-memory.dmp

    • Size

      328KB

    • MD5

      66801d4d9be04b2d333b204cb9d12137

    • SHA1

      0ce5e09bd2e6bf7bdb3892e2599d418902808be9

    • SHA256

      35a638665971b46f92cec6cb948debe25d170671770d3c38d36fa0e1b7f9d027

    • SHA512

      bf5c127cc603a99ef6a1891eb3065f9c8807b0b232a1097bf178a39b0309073188afc5c72a8ef2a02154643875f3493454f98d22487ce6e9eaff4b09d84c89d9

    • SSDEEP

      3072:RcyqhnyFgELfJUkwAKQmrAOYE2ViJH3Q9dznO5NxzHs4cadS2gMRqTjDv/Yneqi5:uO5E1fx7tcaAXMRqTjD4pL

    Score
    1/10

MITRE ATT&CK Matrix

Tasks