Behavioral task
behavioral1
Sample
slot7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
slot7.exe
Resource
win10v2004-en-20220113
General
-
Target
slot7.exe
-
Size
104KB
-
MD5
abe3eeb6a37d82e725b86e3120e584eb
-
SHA1
8df2701e65b17601de19c3a18c6c55f96784d97d
-
SHA256
fbc24a9119f2484a25026cb05cb52d1377b88bda8d6aef13cf32714680c13ade
-
SHA512
b22819bff2102078315766fdf1d0827e1754619169ff592a13932ea658e8bfebfeadc09971197562dbf6f3d4efe0a455e0cc49b2b939d2a3a8c503a47c50922b
-
SSDEEP
1536:4UVrE5RhlBmHD568bQmhVyUt7tZmsGCbYpf8xeR72vsSY00u:4UVIfmHDD8mhXtDFGWnUN9M
Malware Config
Extracted
redline
1
195.2.79.72:13533
-
auth_value
571271d568dd4719d920af9011a9704e
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
slot7.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ