Behavioral task
behavioral1
Sample
400-178-0x0000000000490000-0x00000000004CE000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
400-178-0x0000000000490000-0x00000000004CE000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
400-178-0x0000000000490000-0x00000000004CE000-memory.dmp
-
Size
248KB
-
MD5
98ccdca364e8f86fa86f2f9048a88616
-
SHA1
19c52ca2ca83ec7ff0772a6395f1b3255912abff
-
SHA256
b7e61c88519842cc73c39ee58914da5ecc4340e20f2187133daf99186392f9e3
-
SHA512
82b121536da575487c70868e8bc1ff7ba26d45d7fd572802c71444a868cdc34441bacc1a7dfc68989499a9240c8f08988126873af0af009a2c86306719304089
-
SSDEEP
6144:Zchsk/B8cv3yH9Fjxhcxph54jSgbTlxowikG/:Zchscv3+vhKpL4jSgbno/kG/
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
400-178-0x0000000000490000-0x00000000004CE000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ