Behavioral task
behavioral1
Sample
4940-155-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4940-155-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4940-155-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
578f6200036fd521e3b1dbba5e4c427c
-
SHA1
23e15facb27f558e6bc42180191c569a7de201f3
-
SHA256
e61517e09fec4bdfa981adc1979220c53a9031382c1e04ed0c3090d70e915487
-
SHA512
4d250e987c57595038003419b508629d3174dae52bb3ed658bddd8769b21f2a6b4d3bfd230dfd651f46bbd8a9cfeb95d63ac410275ac130fd7afc9c96911d790
-
SSDEEP
3072:+YO/ZMTFZFoI4T1pm0bWpy5wkVeDF5yRP9h7SSYe:+YMZMBZFoIO80bWo5w1ep9h
Malware Config
Extracted
redline
Eunewdomain2
hrabrlonian.xyz:81
-
auth_value
ec2b750e0ee7d2701fd60bcc6315389b
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
4940-155-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ