Behavioral task
behavioral1
Sample
103020-1150-0x00000000026B0000-0x00000000026DE000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
103020-1150-0x00000000026B0000-0x00000000026DE000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
103020-1150-0x00000000026B0000-0x00000000026DE000-memory.dmp
-
Size
184KB
-
MD5
6b0062a05ffb5ce3ea1efd834ec54ffb
-
SHA1
dafd28d60f25725ec1e0a7f78a99e1ee1c10b8f9
-
SHA256
b33e0ae4e09ca6963431bf66211705131f88715b20d16fc903d5788070050814
-
SHA512
9a9150c72b9a569836014eeac719da25e7d614c3d6e1c6659e93fb292d64b9598cda967dd80c8ecf8e101e71fa120b34cf88aed4e37dd4ff9e956b9eb6cb1e32
-
SSDEEP
3072:LgUAqNoRgNSq+TBDaLRnXhWo1EshUnFaezPN4:zmTjwC
Malware Config
Extracted
redline
inslab26
185.182.194.25:8251
-
auth_value
7c9cbd0e489a3c7fd31006406cb96f5b
Signatures
-
Redline family
Files
-
103020-1150-0x00000000026B0000-0x00000000026DE000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ