Behavioral task
behavioral1
Sample
2608-150-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2608-150-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2608-150-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
2e751d81bcdcdb90caf7aa2b31b479eb
-
SHA1
594f84b570350a0df6224505eb63304c6e368376
-
SHA256
f3d2cede458b55462c71cc660d31b3afccd585b88c4c1315eac2c45fdd6ebb7b
-
SHA512
89c39cc0c5d7ab924973c82e518ed2cd38e6d533e2a5e088bba2f31d45487dfa611a08fbb72ff2e0fb24cbaf7ac11c4fb3a76429a5995d4c3280359d026430c5
-
SSDEEP
3072:ZYO/ZMTF8YMf5T+UbeO7Xu7Ve+DFQxRPnhPSS04:ZYMZMB8YMfMceKXuwpnh
Malware Config
Extracted
redline
Duk
yaterirennin.xyz:80
ncoduryllixe.xyz:80
-
auth_value
4fcab551b8507f2194546356260086e4
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
2608-150-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ