Behavioral task
behavioral1
Sample
1660-122-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1660-122-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1660-122-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
17ddfebde82472c4b039bf1ef8fc2e26
-
SHA1
9180fb7279c597e387ef34158e8621be3027c448
-
SHA256
64164f19f26b73cd76d96d41f9da063692f28206c67436c4dd6cd3d50c1cd08a
-
SHA512
089cd95d6d8a8502814a0999c0b7ed2540817db223bfccc61ab2166073c7a731a82cf6664ecfd7bf6d223e06f3d24b664de4ab6ae421e667586bffb0db656596
-
SSDEEP
3072:wYO/ZMTF9h9owLZQxwKkQy9yvTlVNDFHyRXnhwSS0P:wYMZMB9h9oSQuKkQy9yRQBnh
Malware Config
Extracted
redline
SETH
185.215.113.217:25060
-
auth_value
1442d36104cc73a201f7fb26fd29dadd
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1660-122-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ