Behavioral task
behavioral1
Sample
860-57-0x0000000001DE0000-0x0000000001DFC000-memory.exe
Resource
win7-20220812-en
General
-
Target
860-57-0x0000000001DE0000-0x0000000001DFC000-memory.dmp
-
Size
112KB
-
MD5
45affc1aaeb80f51f8f0056a809411b7
-
SHA1
ac344490014135081745b2b16dca63d7a7bf30c8
-
SHA256
62d129d098e92a20e3dabd8416b94624a866e505ed840cec51401fb4a1a7dcfd
-
SHA512
aedee6e7b4119c7b2d5daed5544029c131becf722e2ffa1705255c41c07464e689cb4c8cd2df384b8480becdb13703f5d49033a6aefaf827935cb53f5bc81688
-
SSDEEP
1536:WPqUPY5QyWjddJg3pawbDVxuFRDNWDNANDhDN5iuwjyCrDN1pvfDNPH1J7mrO2o/:hSEWFGjTnir/fxSb/bh+Ij
Malware Config
Extracted
redline
10.09.22
77.73.134.6:12530
-
auth_value
7fab13178e56a041145fbcd135fe33a0
Signatures
-
Redline family
Files
-
860-57-0x0000000001DE0000-0x0000000001DFC000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ