Behavioral task
behavioral1
Sample
3520-143-0x0000000001220000-0x0000000001248000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3520-143-0x0000000001220000-0x0000000001248000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3520-143-0x0000000001220000-0x0000000001248000-memory.dmp
-
Size
160KB
-
MD5
f3f4549558126d93c60b6d88a0e3a2b7
-
SHA1
dfb110768f599557b33ac9de93ff0d65f0b11624
-
SHA256
4644ac0f02f7cca64df09de78317de3dc36c7f004ec55c81c6c9f226b35179c1
-
SHA512
426eb82d990ccea6eaa91239358ca36323c57404ecc92ffd072692d0db50e8031dc77e2f3ff09d68d6bb363ba767175a8ebcda3e182e980d0d60e00bf16d69ce
-
SSDEEP
3072:hYO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSS/6r:hYMZMBzD64pInpoNeN+jhB
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
3520-143-0x0000000001220000-0x0000000001248000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ