Behavioral task
behavioral1
Sample
154036-317-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
154036-317-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
154036-317-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
2e4249b8be93dd048b12c8d9aaebec19
-
SHA1
fd4823a7bed918f4212d5d06e70f87e8623a643a
-
SHA256
5a8ebb8bb3422c34ca00e9e823df0769d7773622c27af0c5c81b4d411b3b9292
-
SHA512
4e3d334494e235277c36437a575167013e92b5f284ce4981213a76780c9a00e664385cc6526a9f594a0d8089db3ecd09a37b3a1961cca6530cc842960f1c56ac
-
SSDEEP
3072:LYO/ZMTFBNaoXzCwlIfk2kTHtWV1pDFxyRXEhkSS8+:LYMZMBBNao+iIfk2kTHt8peBEh
Malware Config
Extracted
redline
dfg
janolavave.xyz:80
-
auth_value
10f346d0770417f0d92818aeec31441b
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
154036-317-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ