Behavioral task
behavioral1
Sample
3272-149-0x0000000000760000-0x0000000000788000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3272-149-0x0000000000760000-0x0000000000788000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3272-149-0x0000000000760000-0x0000000000788000-memory.dmp
-
Size
160KB
-
MD5
df5c2f2b02303b6cfc64f2cb090407c0
-
SHA1
92f8a36221707e2d0ea0ef0762458538f675f7c4
-
SHA256
713ac75c71b8c8940b9b53e5e3bb3a36e1a69649fbeb7578b65352a484af921c
-
SHA512
fde35000bad654dbc9095a0f7cd56b88cd6e816d6e42922dcc7ade4832b6974d8e0ae53de74b49d85b1323cc54d0118d37d52c99078603b18e1310f64c9a71cc
-
SSDEEP
3072:FYO/ZMTFzbSI4r7Cnf65jOoV2DFabRPWh7SSKM:FYMZMBzbSIM35jOJkpWh
Malware Config
Extracted
redline
slovarik1btc
78.153.144.3:2510
-
auth_value
69236173f96390de00bb5a5120a1f3a0
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
3272-149-0x0000000000760000-0x0000000000788000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ