Behavioral task
behavioral1
Sample
4988-159-0x0000000000950000-0x000000000097C000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4988-159-0x0000000000950000-0x000000000097C000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4988-159-0x0000000000950000-0x000000000097C000-memory.dmp
-
Size
176KB
-
MD5
be7053d207deffaa2953fea4cc21415c
-
SHA1
09d2316a5530216f0fc79be385b24020e11346ab
-
SHA256
81fa91adfb9aa9c8514bf72ac7e46a07b9ec7696e6de65efb7f67fb8e2d91c51
-
SHA512
08e1503923c50e06f489016964997718dd1d8fe9d33655048a8971582ce713881db1ed1db0a6c315f654080c6646dbf3e870c66f3afc25554892adeb23615feb
-
SSDEEP
3072:t4nVRMcuh7ZoB10Te+FQSzsLyJqoD2X9CIDl2pbzKu5zV/dM3K6hz:5hlJqoD8bR2pbzK0V/dr
Malware Config
Extracted
redline
0808-ab
144.202.95.227:80
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
4988-159-0x0000000000950000-0x000000000097C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_APPCONTAINER
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ