Behavioral task
behavioral1
Sample
1692-310-0x0000000000D10000-0x0000000000D38000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1692-310-0x0000000000D10000-0x0000000000D38000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1692-310-0x0000000000D10000-0x0000000000D38000-memory.dmp
-
Size
160KB
-
MD5
9e23ba24932be8c8b492cb977f134074
-
SHA1
eb22374b2bc41ba3416cb12a8fae2c339514ea4d
-
SHA256
d940fe37393c097ea8b81817ef7a4c3c7dbbbd5db88bf931aea564cde9bef921
-
SHA512
db66c55d3ce068df11fb88401d8e0a5fd0e92a318430e71be140032f5cd409bc4f887760f01e49e6d061ff0de1427b358935e8af7748473379ea893cda50fbd9
-
SSDEEP
3072:4YO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SSXo:4YMZMBNR4vIrlO+OIYCBDh
Malware Config
Extracted
redline
buildnewdomain
hrabrlonian.xyz:81
-
auth_value
90794203993789d187f29ff50d00de2e
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1692-310-0x0000000000D10000-0x0000000000D38000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ