Behavioral task
behavioral1
Sample
3484-121-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
3484-121-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220722-en
General
-
Target
3484-121-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
126cf6f4095335e124a2f236db31a9c2
-
SHA1
3966bc2bd4460070e9985216f6c2e56b05ead497
-
SHA256
4dcb725ddae1896361b816b5562923e7381609b40269cbff7a95e9e5a21574ed
-
SHA512
8d3e936debcb5b58e1571ce21bfe2be4dfb60c0e7eace261efbc686cc79071e3f7299948aaf5786f7191ac7a0971a40a4ca847df18d1d4e04267ed9f3e4aa111
-
SSDEEP
3072:PMEisgbLjlp5qMeCMZUx4tk7OF3PNrIJvnn:R4bLjlp5qMeW470l
Malware Config
Extracted
redline
media26
91.121.67.60:23325
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
3484-121-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ