Behavioral task
behavioral1
Sample
100168-134-0x00000000005C0000-0x00000000005E0000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
100168-134-0x00000000005C0000-0x00000000005E0000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
100168-134-0x00000000005C0000-0x00000000005E0000-memory.dmp
-
Size
128KB
-
MD5
0fc39f194903862a9fd8123ea32ed71c
-
SHA1
445ec5b18a159af98f0aa78ed3594ac7e5732b9e
-
SHA256
ac35f7b5c0e1bb906634e5242681613a6dcefa5ac842898dea419965ca6246f6
-
SHA512
0b279baa7e8445830579316c74d565678ec7df0de56d4b1a44f59649979a135db4ebbb0e5292cb0b781dd2abe6ae962ec0914da10db531bb64f3d45cddab7299
-
SSDEEP
3072:NcvFBgCYCpieID9L2eIrbzVcQcUMMODchw4EASNg:NcvOf9IrbB1cRchw4jS
Malware Config
Extracted
redline
@youlie_lzt
litrazalilibe.xyz:81
-
auth_value
4229399b49b4c8e5f0d0fcabd3052956
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
100168-134-0x00000000005C0000-0x00000000005E0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ