Behavioral task
behavioral1
Sample
1508-391-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1508-391-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1508-391-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
2d97122896b63d62a666afd6001a94bc
-
SHA1
05b4edcc07c9c30a4e4485d36ccf38e23e65c875
-
SHA256
a4e087e8775c53c7218aae276b020c73804ec1568d8e479bb049ded7bcebf659
-
SHA512
4d5aeb7f3d9d821e5c6e2d1adda44ba395258fb40dc58342dc115c19b6afb28c1b4532796f4f9a49079390f53871cafdbcb7b2c294ce98f8e37b3d24b6f9e473
-
SSDEEP
3072:ZYO/ZMTFH3wICjEY46Mp6yUuV1rDFFyRP0h2SSt4:ZYMZMBH3wIxT6Mp6yUOr6p0h
Malware Config
Extracted
redline
Nigh
80.66.87.20:80
-
auth_value
dab8506635d1dc134af4ebaedf4404eb
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
1508-391-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ