Behavioral task
behavioral1
Sample
2980-375-0x0000000000700000-0x0000000000728000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2980-375-0x0000000000700000-0x0000000000728000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
2980-375-0x0000000000700000-0x0000000000728000-memory.dmp
-
Size
160KB
-
MD5
1dee3e98945cbcf50d372885a6f98552
-
SHA1
9272fdff06436e48b7b32ca4d387f96ccc72d9be
-
SHA256
1845df0db9002aad9789dd0724fb4c4cb15d1574ff95586bce529f47a3465427
-
SHA512
9038c4e81ca863b675f1028dc6d1f2cd159481ba498712edd773e5ef252ca932a93cdddbcc058b0749352fe767da2ed53bc1ec25222456175fa56f2c25fa5a37
-
SSDEEP
3072:HYO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SSUo:HYMZMBNR4vIrlO+OIYCBDh
Malware Config
Extracted
redline
buildnewdomain
hrabrlonian.xyz:81
-
auth_value
90794203993789d187f29ff50d00de2e
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
2980-375-0x0000000000700000-0x0000000000728000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ