Behavioral task
behavioral1
Sample
2792-171-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2792-171-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
2792-171-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
de0e2e86a0cae1adeb8aa41addb0a230
-
SHA1
36ce6915b91fe8a91a23dac74a17a800faec0b25
-
SHA256
66b5d1ba5829d569d140d5d03710fded4b3ea20afc5889ff2e244de43afccd34
-
SHA512
030938cffbfa5a95c4bf1514a44bf35bcca1958060bb3574542d8a7e57263140a4c99d99ded4656d2dbd158eb36f17782c2764dcb176ba5a2bb9d9181e0ce7b8
-
SSDEEP
3072:OYO/ZMTFjTDYI7TGr0mVNWVpDFBy5P8hMSSU6K:OYMZMBjTDY0K0mVN8GB8hK
Malware Config
Extracted
redline
GROME
185.215.113.46:8223
-
auth_value
661a72ac2a03d150c942125925f4c109
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
2792-171-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ