Behavioral task
behavioral1
Sample
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3.exe
Resource
win10v2004-20220310-en
General
-
Target
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3
-
Size
102KB
-
MD5
aea31b804e5d0526629067b4dc981247
-
SHA1
acb0d581c7545ff01ef994f445af1f7ef9405a6d
-
SHA256
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3
-
SHA512
344b6cfdba514a9fa5f504a92362d73c46ba5272841cb9d94685df1addbcc2255dc3d56431f15bfbb0944138e80535e914c8018fe47e282e8b394031b57615fd
Malware Config
Extracted
redline
YT
109.107.187.94:22324
-
auth_value
c680644e98eb74faf59b8b87eef85c1b
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ