Behavioral task
behavioral1
Sample
1084-295-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1084-295-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-en-20220113
General
-
Target
1084-295-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
e5a6bee1373a987d6d16d6a4aeff7d8b
-
SHA1
d6090df5237f0089468b174c45df9def93ed73b7
-
SHA256
e2ef944cb72cb2a35f1a67a07bf541b95523460e4b9898090a56fc8c3cea59d3
-
SHA512
2a7a790521ea6d7662b93cba8e92b88c0f4cd2c0b0bb11f8875e66e4796cb23469c525f2d5ff30eb61d291572efdd940c42c878b6b0d3a5f819a7d97e3fccb91
-
SSDEEP
1536:y0DckCrkG2INAFcZx5OmBV/SUe8Sdc2s+nbfdpbuTx9rZvV9Lf:y4CrkGOu5BSUe8tQre9vvD
Malware Config
Extracted
redline
@ywqmre
185.215.113.66:26416
-
auth_value
5aab3b27575b218cc78165f1b5c607a0
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1084-295-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ