Static task
static1
Behavioral task
behavioral1
Sample
1632-58-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1632-58-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
1632-58-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
46954cb25dfb9fb12dcd99f9da868736
-
SHA1
c8f59f20f63f5db69312cdff8d07b81b4fe297e4
-
SHA256
abf6956374baa0fff26788a6476692bc45445e3e6c95ba2c157e958d6cf96daf
-
SHA512
9c482b1e1883bcaf803cff3bdad33a06b7ae33302631519bb2d01f35f3e9148fe7a2a47343b93939fc52c548d0f3d7926973a5a48fedd0ef7437d14806dc935e
-
SSDEEP
1536:qRxakCr5Q2IlAJcGXh4SQtr8x+r9CInE+nf8Hd+uVbuZNoxxrEAi0wuei6tL/:iCr5QKT8LRCQ1f8Hd+634Aihrr
Malware Config
Extracted
redline
@ansdvsvsvd
46.8.220.88:65531
-
auth_value
d7b874c6650abbcb219b4f56f4676fee
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1632-58-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ