Behavioral task
behavioral1
Sample
1632-60-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1632-60-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1632-60-0x0000000000400000-0x000000000041E000-memory.dmp
-
Size
120KB
-
MD5
a0387ead50d048672a011c7aa0cdc871
-
SHA1
6118c217e977c15051167d3e1b051b29fbd4f44e
-
SHA256
21900cd951c408d222e9289443bd0b8fe8affe4c95bf0cb162a0aa1002f1b834
-
SHA512
7bb197c49262db4cea6673865c10eb49e5742c0a134fa36849cd0f91fcd95bc3cc0674bc0bf1d39cf7103d39af2a10f0509fd75188c096b6a34a2060c6f05702
-
SSDEEP
1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2ctmulgS6p:r0gzWHY3+zi0ZbYe1g0ujyzdA
Malware Config
Extracted
redline
noxus
13.80.126.214:9214
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1632-60-0x0000000000400000-0x000000000041E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ