Behavioral task
behavioral1
Sample
99860-57-0x0000000000090000-0x00000000000AE000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99860-57-0x0000000000090000-0x00000000000AE000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
99860-57-0x0000000000090000-0x00000000000AE000-memory.dmp
-
Size
120KB
-
MD5
f334a5b071797ba01950d298cd77a60a
-
SHA1
4ee80c041a29d7fa374170ee947e4bd4cb48defe
-
SHA256
291e11c6d61f5c108681b9850acb8cff2d9730861d74de50aebbd2982582440f
-
SHA512
0640871f55408e2f179aa2a5a3e2aea895a1e93bd681370901d3f3d771626e3c905bfdf4f20992dc8ba3d6d74333af9e09203eb4f1bde9dcec05991275edc3ea
-
SSDEEP
3072:ByeUYl1LiEU4WcILg8LbZnMc/QIzKVqk/AI/ojNR:EEia8hm/gN
Malware Config
Extracted
redline
1851281290_99
cellrepairs.top:28786
-
auth_value
82f98d7ce7c6a5819bc7d092b2745dc0
Signatures
-
Redline family
Files
-
99860-57-0x0000000000090000-0x00000000000AE000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ