Behavioral task
behavioral1
Sample
1020-169-0x0000000004B80000-0x0000000004BB4000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1020-169-0x0000000004B80000-0x0000000004BB4000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
1020-169-0x0000000004B80000-0x0000000004BB4000-memory.dmp
-
Size
208KB
-
MD5
b0f8ee3bf5ad2ef126c3b0406085c455
-
SHA1
b2fb1162621e180fa6e08a2a876526af74fdf76d
-
SHA256
d79192949fb69d0e9a2d65f78abbffbc3f9ddbddcaea01f249b19f47c835f0ae
-
SHA512
a3eedf21de78e50f2ec62dc2feab98791746f257a42462422be66a0f94e85f45c581651cb16efedbcb8d9f8e2e0b46962afcf9c36fe13e058ed6606497a8053b
-
SSDEEP
3072:0igHULvNqo9viDKl67T7uHqqOlqVqqqqqqq0qqqqqqqqqqqqqVqqqqqqqqqqqqqP:zcUZiml/udcmh
Malware Config
Extracted
redline
3
51.89.204.186:36124
-
auth_value
21358de8b6cf817d47956ee1614a9bfc
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1020-169-0x0000000004B80000-0x0000000004BB4000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ