Behavioral task
behavioral1
Sample
2408-303-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2408-303-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
2408-303-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
beee8fe94dfa7fdb593d08f5ff563ffb
-
SHA1
67e3386b28017f937d6d3b4f5677a4b42dc13737
-
SHA256
f94193a2023921f9073257fa1a1b6710cb3dca6ea8d94c0d76a26fdcbb91188b
-
SHA512
f75f0e262d3bd1211fe93588cfd9f7f474ff8eb750fbf96e0f2af9c1e4e9a0f847825e77a9005be74065fb7b452fa1a84f06ced3e1dbf65e7a5b8ca750a779d5
-
SSDEEP
1536:H0DckCrkG2INAFcZx5OmBV/IK6a0SBAKfjBbuTxtrvvyMLR:H4CrkGOu5BIK6oN+bvrN
Malware Config
Extracted
redline
@ywqmre
185.215.113.24:15994
-
auth_value
5a482aa0be2b5e01649fe7a3ce943422
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
2408-303-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ