Behavioral task
behavioral1
Sample
924-87-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
924-87-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
924-87-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
88dc0f1fe41e3f33e81bb9b57c2ab697
-
SHA1
eb9c1e50926b687e0dc01c6880fc4c9b7ee6909c
-
SHA256
0235e9c42d85a974f8f32c97505e61cdd38efbf27667a353c9a0ae2fe8b8a268
-
SHA512
ee9ef2cae4543fd6b62dde11dfef0f8c2812dfa28516d470ac21126bcb7341d7ce058246f9ca34ae8c9fb0330ec49bfef21beef383e19dc095be013ce2496882
-
SSDEEP
3072:6YO/ZMTFHfCR2RAYQDOOkUlaa3TV1DFnyRPzhNSS:6YMZMBHf2YtBUlaa3v4pzh
Malware Config
Extracted
redline
For you
185.215.113.46:8223
-
auth_value
34ccfa964c9a3fc572eb3c6cf40e56fc
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
924-87-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ