Behavioral task
behavioral1
Sample
3588-165-0x00000000001D0000-0x00000000001EC000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3588-165-0x00000000001D0000-0x00000000001EC000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3588-165-0x00000000001D0000-0x00000000001EC000-memory.dmp
-
Size
112KB
-
MD5
dd0bf1e238ccf4cdc675e209d921e920
-
SHA1
799293531f4769f2d2fed77a75fcc4924565ac32
-
SHA256
1c965c9b8242d4975ea8a0affe514d6c7695bfb86a921ec96cdf1d416f5c3538
-
SHA512
1ab8fedc4010ac323ae03221b583498fa9a10fd1c7e4b977507cd8bfac21a93cbdc2e51e5e9b813c45419ecac6de17e9f114b2f7dfe320f293307955e8f9acab
-
SSDEEP
3072:oJCGpEsGGN1t1d9aWog/4jFsYdTCqa/NRB:oJj8GN3f
Malware Config
Extracted
redline
Lyla.17.09
185.215.113.216:21921
-
auth_value
24d8e4d0b3a414bc499b352c6f4fa44e
Signatures
-
Redline family
Files
-
3588-165-0x00000000001D0000-0x00000000001EC000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ