Static task
static1
Behavioral task
behavioral1
Sample
4248-321-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4248-321-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
4248-321-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
df4ce58938d665fa3e110f7e6dca56db
-
SHA1
22b9566e6c101f9466976337f2fb137018b027fe
-
SHA256
cad99e5ec17cb4924a7c85484403d5f2c8715488621968a0312440b303373055
-
SHA512
2407353a4222a16b0415fb5e7a671d5bb1731045be1ece3aa770d9fee1f256df74942c7e70a86437ff1a94e2b876c005b759b047812cb96b4c12a0d3cb1186d3
-
SSDEEP
1536:m0DTkCrnG2IFABcZllnG+TUDIBxiujpIUYi2GzfbuTxhusH74ELR:mrCrnGSGjCIBP20kjH7Z9
Malware Config
Extracted
redline
ruzki12_03
176.122.23.55:11768
-
auth_value
c51ddc8008e8581a01cec6e8291c5530
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
4248-321-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ