Behavioral task
behavioral1
Sample
2092-315-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2092-315-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2092-315-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
898887c7a2a3f3b136740c281602d576
-
SHA1
d9fdf79116699272a4ba5df2eba5744f19dff6b7
-
SHA256
8a8aa54da3b994eef81f64d7c53d9e5e25b548ee122bfc64795b95171d04959c
-
SHA512
09156aecf7261484a677583ed80052e92020ec19bcea795467117318d47d5c0a58f0736b908e618668b5bffba60dd78c0dce7084dd9a440a5ed14d2eed2801fb
-
SSDEEP
3072:LcvFBFCYOpikIcgtKcdOMNx7QcL3+UDch44EASNN:LcvbZbdjrUcBch44jS
Malware Config
Extracted
redline
LogsDiller Cloud (Sup: @mr_golds)
193.233.193.14:8163
-
auth_value
56c6f7b9024c076f0a96931453da7e56
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
2092-315-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ