Behavioral task
behavioral1
Sample
105744-279-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
105744-279-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
105744-279-0x0000000000400000-0x000000000041E000-memory.dmp
-
Size
120KB
-
MD5
123043bca470bc40b6161f2825193288
-
SHA1
3dfa57212a35aca2122b4a1a6ac7ccb702847d56
-
SHA256
134270a074e4fa1dc731802bd1b2f937325605417578c4caaa804f6916c2f793
-
SHA512
b16eed93185d474ed1b2e63933e4d972f438a82c7fecd47089997c464a18c348d7c5412caf68ca00a64bc60be97062ffa1c1b4dda69ce342f88b37674daf972d
-
SSDEEP
1536:5907hu8z3lbG6jejoigIqyYLB3UicrMFW08UAiqumbfcxv0ujXyyed1TtmulgS6B:s4CFYqciRWjUA57C0ujyzdiv
Malware Config
Extracted
redline
875784825
79.137.192.6:8362
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
105744-279-0x0000000000400000-0x000000000041E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ