Behavioral task
behavioral1
Sample
1372-56-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1372-56-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1372-56-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
c1f2217dd4beb4c99e74a49f88d20693
-
SHA1
eba017e6b6647bf0ab746be76fc5c553e77108ff
-
SHA256
68fcf27bac93dd0b9034498ccfa8ce44fd996aa1fc112b5597b4f8543ccc6980
-
SHA512
9a31a93ea1aafb5753a0e1e079fb5f02ba635a6560bd04954b2b9c55aeb6f6e8b1cc552aabaadb92eeca0fa83d8e90f387c84cf0e960cdf107f563ab27ca21c4
-
SSDEEP
3072:gYO/ZMTFz7rwICrYVWxjNuDQDJqVNDFF0RXqhgSSQt:gYMZMBz70Il+NuQGwBqh
Malware Config
Extracted
redline
3
45.15.156.86:37262
-
auth_value
d85366020a96552bd07acdfc49dc187c
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1372-56-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ