Behavioral task
behavioral1
Sample
103380-302-0x0000000000410000-0x0000000000438000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
103380-302-0x0000000000410000-0x0000000000438000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
103380-302-0x0000000000410000-0x0000000000438000-memory.dmp
-
Size
160KB
-
MD5
966e38b281c0ca62a170f7be1c668f99
-
SHA1
16707dd38faed27a7a9d34c11f0c9ad0ab98c224
-
SHA256
9b45141b35e7b3e0e8be76d1b1d1d0839f8dfd7cc63c351a532d650241368292
-
SHA512
62870ecb80ff6af7cbdfa6ff36e9984a5861314b1a5599f27f20ba5fe39ab0bb5c65f45a5ff8f7f78c1d5bb1c81469d9e4f3dbed2c02a953426ba06b09ee5f77
-
SSDEEP
3072:yYO/ZMTFr1jZAoRz4X/9Ep0OuIV3DFhvyRPEh1SSLq:yYMZMBxNAoWCp0OfOpEh
Malware Config
Extracted
redline
981705428_wsiv2wqu
179.43.175.170:38766
-
auth_value
ea424abde1f4c7328dd41ad4f28f74d4
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
103380-302-0x0000000000410000-0x0000000000438000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ