Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
General
-
Target
tmp
-
Size
137KB
-
MD5
7357ebff6a98df7135b5b4be8ff5451d
-
SHA1
7ea82d17eb6d7b1a4c5a2d5240a1ca63bc9809e1
-
SHA256
54ab734131bcbfaded15776d689015fb747cc7919b70b2d8b1808e103bacebb4
-
SHA512
5a23c49b243610ca82ca0308d1b01341da22a59cdaf62b682ee2333bc2e4465c875f5a78f422a2281d9684d76e116bdebcaad98f31e9717db65e4b6779a85fdd
-
SSDEEP
3072:zYO/ZMTF//4Y7DcN8YOuNZ8AV4DFlyRzqhdSSB6y:zYMZMB//4YkCYOuNaylqhc
Malware Config
Extracted
redline
bred
77.73.134.251:4691
-
auth_value
0e8ad10c690c62fa90b012542647f121
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ