General

  • Target

    2196-14-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • Sample

    241209-kj1hyaskgx

  • MD5

    6b94763b308745d0f0b0f5e7c7e04c6a

  • SHA1

    cdc80d23a3e3e3f9b6e13a48d0c9314af6b4daf0

  • SHA256

    6d6d004fe0a2370daf018a1b629e950187b6879a30b468ca3bafe55de1ff2cb7

  • SHA512

    ec83d95e26a3330e633a7576e231721f727455a903b7337b90fb6bc4d4a9736fe45e9a74d13c9d01604fb0555c980c5dbede919fae1e0015ba0bd3fb6ec3a8dd

  • SSDEEP

    3072:uq6EgY6iirUjWGIAwPsuU341B/TA1tA0ioYcZqf7D349eqiOLibBOm:VqY6iHwPCo1RTA7A0YcZqf7DIHL

Malware Config

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Targets

    • Target

      2196-14-0x0000000000400000-0x0000000000452000-memory.dmp

    • Size

      328KB

    • MD5

      6b94763b308745d0f0b0f5e7c7e04c6a

    • SHA1

      cdc80d23a3e3e3f9b6e13a48d0c9314af6b4daf0

    • SHA256

      6d6d004fe0a2370daf018a1b629e950187b6879a30b468ca3bafe55de1ff2cb7

    • SHA512

      ec83d95e26a3330e633a7576e231721f727455a903b7337b90fb6bc4d4a9736fe45e9a74d13c9d01604fb0555c980c5dbede919fae1e0015ba0bd3fb6ec3a8dd

    • SSDEEP

      3072:uq6EgY6iirUjWGIAwPsuU341B/TA1tA0ioYcZqf7D349eqiOLibBOm:VqY6iHwPCo1RTA7A0YcZqf7DIHL

    Score
    1/10

MITRE ATT&CK Matrix

Tasks