Behavioral task
behavioral1
Sample
3248-140-0x0000000000D00000-0x0000000000D28000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3248-140-0x0000000000D00000-0x0000000000D28000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
3248-140-0x0000000000D00000-0x0000000000D28000-memory.dmp
-
Size
160KB
-
MD5
fbddcaca41256e21616b5875659ef46d
-
SHA1
3543de2d5cac2c4e7406cc67c50f7ce66980df05
-
SHA256
4d80e130d077718fb854c4448675e3b0272861ed518ed923fd9e9cdc24488d64
-
SHA512
db11fd2cced4d6be3e309cb65bf841895036d5d7e3e864aac8e865b0a5474939d7169591230200c1485677c867dcc9d3812c6a118c0908f1092d6d8633b77877
-
SSDEEP
3072:TYO/ZMTFzbSI4r7Cnf65jOoV2DFabRPWh7SSYM:TYMZMBzbSIM35jOJkpWh
Malware Config
Extracted
redline
slovarik1btc
78.153.144.3:2510
-
auth_value
69236173f96390de00bb5a5120a1f3a0
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
3248-140-0x0000000000D00000-0x0000000000D28000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ