Behavioral task
behavioral1
Sample
220-140-0x0000000000540000-0x0000000000568000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
220-140-0x0000000000540000-0x0000000000568000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
220-140-0x0000000000540000-0x0000000000568000-memory.dmp
-
Size
160KB
-
MD5
02e69247108c872538e20b2d84bf7c1c
-
SHA1
76d5f5bbe952fedbee12565ed7642b4867d1dd77
-
SHA256
5a273d175df4c85046d44a083447dd22ec73f2674759c84596766f8ec0ec7a75
-
SHA512
8cdf924a0b3c5b22241eb01d9f2d32819a9340ed0c1c0656938373546689d34d9ce46ed999aa9f45bc1d61d9a120fb612351bd704d5cb086ada4cbcd54f28ee9
-
SSDEEP
3072:iYO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSSA6r:iYMZMBzD64pInpoNeN+jhE
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
220-140-0x0000000000540000-0x0000000000568000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ