Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp
-
Size
137KB
-
MD5
459ce14b38db72e84494d087bd6504a8
-
SHA1
25a29ff4557a5e0bac17418691c1c95385579cce
-
SHA256
ff1a30bcc13af973a8f8000b30dfb40e57e79bd6a6818fd3cf57fc715217a1f2
-
SHA512
eb88543fef8ea7d5c26d9b5693b316e846ab6fdf154a304fe6c19fc6002320c9ef45789c759c308717498f85f3cb16ed08a2b55b4285e5eae18f34c0bcbe9381
-
SSDEEP
3072:ZYO/ZMTFBVSInzatNfvoR03qtVzRDFZyRF0h+SS41:ZYMZMBBVSIGDfvoR03qzRC70h
Malware Config
Extracted
redline
muka
77.73.134.251:4691
-
auth_value
3b26ed11f72ed6955371ddcb1b745686
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ