Behavioral task
behavioral1
Sample
1336-55-0x0000000000A60000-0x0000000000A80000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1336-55-0x0000000000A60000-0x0000000000A80000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
1336-55-0x0000000000A60000-0x0000000000A80000-memory.dmp
-
Size
128KB
-
MD5
44f5a11de3059301102a8f8463a50396
-
SHA1
6f351a2ea810a85bef7970aca729473c8bc52b59
-
SHA256
3ea3a1afd840c994e3da1e6300430671a8c5a8c4048b3370d4d77e48d7593f2b
-
SHA512
edc1288cf2132d20e2fd78d9ebdad6867437cb5e2d08498ccdc9054c7b442f305b426719381f0c02833f6a9abea1668bb8b4705a238aff4c9b5a69be92bfc108
-
SSDEEP
3072:8cvFBQCYypiUIb367sTcJc6p7crxRDrhR4EASNK:8cvuNpTcJNZcTrhR4jS
Malware Config
Extracted
redline
76
139.99.32.83:43199
-
auth_value
44d461325298129ed3c705440f57962c
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1336-55-0x0000000000A60000-0x0000000000A80000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ