Behavioral task
behavioral1
Sample
3060-292-0x0000000000950000-0x0000000000978000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3060-292-0x0000000000950000-0x0000000000978000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
3060-292-0x0000000000950000-0x0000000000978000-memory.dmp
-
Size
160KB
-
MD5
1a1db2829b19edf3aaa2332f40c097ac
-
SHA1
bcd4fe3af46ad257d7c19a6125627cbdee972837
-
SHA256
5c42ef0246053f84c93af68601d23e73f07da9920b2b743e08ce269a5ba96110
-
SHA512
f0ef315b277281572837d3cad9cf57cd1501440a8c3214eaee03fb42c0d4c083f602a42100098705263e8f3b84bf2865be9e15546b807a11e78f2301bc4fd330
-
SSDEEP
3072:OYO/ZMTFgcf0hnN4be5spjX+NVvDFTyFPqhJSSPb:OYMZMBgcf0T9shXIAVqh
Malware Config
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
3060-292-0x0000000000950000-0x0000000000978000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ