Behavioral task
behavioral1
Sample
1708-59-0x0000000002550000-0x0000000002584000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1708-59-0x0000000002550000-0x0000000002584000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
1708-59-0x0000000002550000-0x0000000002584000-memory.dmp
-
Size
208KB
-
MD5
1028e8b370aa3bd0a4391bb9b23201b7
-
SHA1
5eaa00299b2b4910ca5ecb9e2f044ce4becc5920
-
SHA256
f806835a1b630dd4cccb4621a5f6c551ab129e4c697a943367d3ca27f58f3402
-
SHA512
7965b426c822d82bc85486d391e33e6ee807918ef12da51a1fbe1da24c886cb54eba7ffc981be601f2b2314cbc58cbb2bce62751050b30c86ab0811ddb40b498
-
SSDEEP
3072:VtgHUcv6RelQQh7H922ex6qOlqoqqqqqqquqqqqqqqqqqqqq6qqqqqqqqqqqqqqF:bcUfzQ1+EkFh0Zh
Malware Config
Extracted
redline
2
193.124.22.7:35632
-
auth_value
59967defa326eeea5c873678294c84b0
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1708-59-0x0000000002550000-0x0000000002584000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ