Behavioral task
behavioral1
Sample
4132-138-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4132-138-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4132-138-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
19f8a0a66d8ac31b738c61d44e196a13
-
SHA1
eb38c940b06a89d60d80d0db543700998e4b1b72
-
SHA256
7686945a2f86eb923d8cf8be7227b3847a15e4700da47b37386a4629c72228dd
-
SHA512
ca4cf531e34011cb73050c870e1249c048a16e88ce4b8e024f3c7df9c272e3a388ac7b58b7a58546ff7bd5979043436980f1cbbcf3b22e72ad281e3823fafda9
-
SSDEEP
3072:cYO/ZMTF4XuIQj/9c0mVNWVBDFoywPIh1SSI67:cYMZMB4XuIQK0mVNMRoIhb
Malware Config
Extracted
redline
petyshara
116.203.238.163:20264
-
auth_value
7ae447c44f6c2c84bc8335772075b539
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
4132-138-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ