Behavioral task
behavioral1
Sample
1104-55-0x0000000005BC0000-0x0000000005BF2000-memory.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1104-55-0x0000000005BC0000-0x0000000005BF2000-memory.exe
Resource
win10v2004-en-20220113
General
-
Target
1104-55-0x0000000005BC0000-0x0000000005BF2000-memory.dmp
-
Size
200KB
-
MD5
0303814a78f3dba78885a8b50dfa48a3
-
SHA1
8b4dfade45d299bc956f73aaced406d6409ab7b3
-
SHA256
cabc95d43791716899c1b597369c5a43e4eb08d7ef00ad91a40b7ae04a4809a1
-
SHA512
24a6b0b4824f78394c82435408c751d1da2b979848672e1cfa539eee41f8916bc4c3f9ab7806d3880fa026e4acba32a1ca3d44f8012e350b88dc282db52373c2
Malware Config
Extracted
redline
proliv
88.198.74.87:29609
-
auth_value
e71a9133d1013ae3bc3c929ec5a1f73a
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1104-55-0x0000000005BC0000-0x0000000005BF2000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ