General

  • Target

    2964-83-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • Sample

    240314-pgh84aea65

  • MD5

    4a7e1b4a063aebe3bd97f66121477afe

  • SHA1

    ec0874b0f1bf05c69ae7113121d12437dd9ff1e1

  • SHA256

    adf57b56c1473a3fb44b1f181202a6ad85af5d8bccfdee1cac571c81301311d1

  • SHA512

    82b02de026d08797f20f2ced84ab925f490661c0a70518681a3690d62ed112d0370cbb2df14f78e84fff2c2c9c136dfd9cae325d9549010230684d4bba9e26ac

  • SSDEEP

    1536:WDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:68sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Targets

    • Target

      2964-83-0x0000000000260000-0x0000000000290000-memory.dmp

    • Size

      192KB

    • MD5

      4a7e1b4a063aebe3bd97f66121477afe

    • SHA1

      ec0874b0f1bf05c69ae7113121d12437dd9ff1e1

    • SHA256

      adf57b56c1473a3fb44b1f181202a6ad85af5d8bccfdee1cac571c81301311d1

    • SHA512

      82b02de026d08797f20f2ced84ab925f490661c0a70518681a3690d62ed112d0370cbb2df14f78e84fff2c2c9c136dfd9cae325d9549010230684d4bba9e26ac

    • SSDEEP

      1536:WDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:68sO/O2DnEba0LxNEyPNcmpTuY8e8hT

    Score
    1/10

MITRE ATT&CK Matrix

Tasks