Behavioral task
behavioral1
Sample
1048-55-0x0000000002210000-0x000000000224C000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1048-55-0x0000000002210000-0x000000000224C000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1048-55-0x0000000002210000-0x000000000224C000-memory.dmp
-
Size
240KB
-
MD5
040f647800dd7822a67dbf1a24d0aa61
-
SHA1
232d77eb12a7a5ab8150cb1448d96e578a47389d
-
SHA256
3b6b64daf8639dd1deaefeba76e2f1ac88507f8c239ac361ba743125e9994cd5
-
SHA512
7c5460fa2e87d5747cf9120819dd6b230c34ab0c1db6a86ae4d2d901294bc5619f52e178a3b1f0f7e007fa13527800e56bac63d69b11e3d6656b9c3c4f4bbdb8
-
SSDEEP
3072:hjqrLWeRQzE+R/17rFjVq5us+nIpOOgAsmZw/YKFHiqoeboe/SR1bthqTOSPwOHX:hjqrIEspVa5bpOvmIufthIPwO
Malware Config
Extracted
redline
mytestself
38.22.104.75:9977
-
auth_value
b22078b69f45f5d9d12597cfcefc3b95
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1048-55-0x0000000002210000-0x000000000224C000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ