Behavioral task
behavioral1
Sample
101384-167-0x0000000000400000-0x0000000000460000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
101384-167-0x0000000000400000-0x0000000000460000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
101384-167-0x0000000000400000-0x0000000000460000-memory.dmp
-
Size
384KB
-
MD5
7dbbf3027ee475958aee0a7d29376674
-
SHA1
fd0d52a9ca47591107c4a7cc9f8f78973397640f
-
SHA256
20002d3cc46b08890b95f70e98441c063fbd405182d5403a07671d84585bdf53
-
SHA512
d8e01a613b7558f1327a1a0ab93480e6c33f5cf6e97d30cfe0a52536165884e3db858dfcf819b2d66860c27705525340cdca989408b1ed7348d94cf35d400c35
-
SSDEEP
6144:y/LAU4zIe6YmPW5MeLF2lQE7oOJLdrc0Wg5HN0KVCFDvX5gFTg21jo8zKgktmaen:28U4z4fe55B2lQE7LJLdrc0Wg5HN0KVf
Malware Config
Extracted
redline
mario_new
176.122.23.55:11768
-
auth_value
eeee8d5fcc3ba3a42094ef260c5bdcb4
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
101384-167-0x0000000000400000-0x0000000000460000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ