Behavioral task
behavioral1
Sample
412-200-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
412-200-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
412-200-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
dd8688c20da84056fe3e48e17fb1a1d9
-
SHA1
4fae689236260fde400927037c651dc348f3c5ef
-
SHA256
3400083e435f22f2dcd9171467dc8f8530f2c4fff181de151b4502128095b56b
-
SHA512
4c087405d0f1dcdac17776b1f2797654e89bceb76c1faeb3c28066b5f4518618a30e282c45da2cbff4a6d21478353dc35060008143932e2212c3e53fa46ee5d4
-
SSDEEP
3072:TYO/ZMTF3XuIQj/98KkQy9yvT/VGDFTyRXIhjSSsP:TYMZMB3XuIQyKkQy9y4cBIh
Malware Config
Extracted
redline
31.10
194.87.218.5:9630
-
auth_value
6223ceba7350b5fdfd29a51c01ad5fdb
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
412-200-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ