Behavioral task
behavioral1
Sample
131936-154-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
131936-154-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
131936-154-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
0012b00dba3ba1fc0ed07e603c62a6ce
-
SHA1
b3b575e76e4474b4e1b5fa956b2b2031a823d5e4
-
SHA256
d5ca6c5558185032a0a5a3e607679f4538338529ee052641df5c469ac5490e5c
-
SHA512
dd817d126ea27cf45633b359014a1cfc48c970eb39cfa985397005b4c0f86c848795aacecb3187ba61cffa93d96e5f033db05bfef26c0512320972dc6045072d
-
SSDEEP
3072:GYO/ZMTF02ZUB71ePlJW4OVyDFIlRPHhYSSL2:GYMZMB02ZUTqlJWSYpHh
Malware Config
Extracted
redline
@EBANIYNOYNAME
82.115.223.48:26393
-
auth_value
3517499b9df589c8c64f775931cb7b6d
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
131936-154-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ