Behavioral task
behavioral1
Sample
1936-80-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1936-80-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1936-80-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
0f8d82c0ed99d4008139750a35578247
-
SHA1
74a0567a05a8e4f5347f4ef772c876d5a79e9b39
-
SHA256
c996174ee84c8026edaaa7743474fd20dc59478de80d7350985b65a6651ced51
-
SHA512
99770709482047cf682a9c2a94108e93aa2c538114e3325d37bcea1e265b57e04ab7e5e4abc527f1317319b9dacf3f51819ecd4546c029378c04fecbc039b0ad
-
SSDEEP
3072:qYO/ZMTF6qmAFzNVmbRqViVdPDFQyR0xhZSS:qYMZMB6qmA/cbRqV8xyxh
Malware Config
Extracted
redline
Buk2
tyastazirowi.xyz:80
yaterirennin.xyz:80
-
auth_value
813662de00b041e18fa868da733fca07
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1936-80-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ