Behavioral task
behavioral1
Sample
1932-59-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1932-59-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1932-59-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
c9771c0dc4c378d3ec5314a88c717df2
-
SHA1
f7fa3a5cc6fd8dd613c5463992aac3ef9d5570d5
-
SHA256
e71861167b9b295875a64448bab183b516e44afb93a2446bb35e739903c3cf26
-
SHA512
01162fc71278c714d0923d43043826ab754b958b4d77f269de4a947c9fd4e4bfc32c8ee69050e2a68d0cfd366d04260dc22b06b55850cd0059746cdb873755c8
-
SSDEEP
3072:gYO/ZMTFzj164j7QlEEfoWJ7VlDFYJRP3hxSS:gYMZMBzjc4IGEAWdkp3h
Malware Config
Extracted
redline
nam6.1
103.89.90.61:34589
-
auth_value
5a3c8b8880f6d03e2acaaa0ba12776e3
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1932-59-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ