Behavioral task
behavioral1
Sample
3752-304-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3752-304-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
3752-304-0x0000000000400000-0x000000000041E000-memory.dmp
-
Size
120KB
-
MD5
d25b1accc7d7c42ad606feb8ae742d44
-
SHA1
83e68bc767f1b8a6c7c0d26632838da05a0c2cee
-
SHA256
06b7a1183dda45b21b8a4d91c38be3be6282aac9f326eda1d706ff91ff6ea65a
-
SHA512
398dd194cf9925e80407eafd699fbe620daea41d35f0576a6b2c56bfc96d6acd7f8cca5eee8734b4059368351d90ea1fa5129fb7997ace2da272821849b0091d
-
SSDEEP
1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed203teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdKY
Malware Config
Extracted
redline
cheat
45.155.165.111:1334
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
3752-304-0x0000000000400000-0x000000000041E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ