Behavioral task
behavioral1
Sample
1880-136-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1880-136-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1880-136-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
fa5d749a253143208b66805aee933d6f
-
SHA1
807e86e705fb27ad56c99c4777ae410af0310e12
-
SHA256
59072298d30bd3e9e2c076bce35974dbc779641923a38a191a325edfffec2832
-
SHA512
0b17431805049327d6ff6edb2d33e1ebd291e53364279018eee0df08e4c5a7919acbf2cf9ab557307d0fd734e56802e82f05e900bc33a2b96e5d013c1d5962e6
-
SSDEEP
3072:EcvFBoCYPpiIIdYxZwVdLBKFQcipxDIhh4EASNz:Ecv2O7VdlKucwIhh4jS
Malware Config
Extracted
redline
nam6.2
103.89.90.61:34589
-
auth_value
2276f4d8810e679413659a9576a6cdf4
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1880-136-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ