Static task
static1
Behavioral task
behavioral1
Sample
352-215-0x0000000000FE0000-0x000000000111A000-memory.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
352-215-0x0000000000FE0000-0x000000000111A000-memory.exe
Resource
win10v2004-20220310-en
General
-
Target
352-215-0x0000000000FE0000-0x000000000111A000-memory.dmp
-
Size
1.2MB
-
MD5
71f24a064cbf418f0eafa989cc08df8b
-
SHA1
f1bd0876dc8ae7b61dc990d3df02c89e2a000015
-
SHA256
cb2e12a627439114e3e5714e9746361739fb4c9f3dc8d9ee1207cea779dbc6ab
-
SHA512
e7be544287848ad0ff57ce8692795a706976e4f357d64a364bdfe221ecd9c1e341875e1b9d679e2ed7df60cb5262918c1da7c4c45e875669a1f4f768394e293d
Malware Config
Extracted
redline
fullwork1488
91.243.32.165:41754
-
auth_value
a4384deb7b09a3c1c21c6447924c2d9a
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
352-215-0x0000000000FE0000-0x000000000111A000-memory.dmp.exe windows x86
d49d514b07668a1a78c8ece769f5a018
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
user32
GetDlgItem
advapi32
RegOpenKeyExA
comctl32
InitCommonControlsEx
mscoree
_CorExeMain
shell32
SHGetIconOverlayIndexA
Sections
.idata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 808KB - Virtual size: 833KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ