Behavioral task
behavioral1
Sample
4600-139-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4600-139-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4600-139-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
3785c2e7d9072ac99b319e40d341884f
-
SHA1
270c2f90bff46773d2c9a3ec3e2729567834346c
-
SHA256
f60755768f25a093bb1270134c91371e874e34b1c0b89e358a16ebc7045ee03c
-
SHA512
e817d8ba43a8bf7e342b154613a2c57eb06dc107e8dc51b1ea5a9934182ba7f4b6abe40d10457e2f01739087e062747ea8da3c6191acc2ca1caa09ea222be90c
-
SSDEEP
3072:xYO/ZMTFjI+UUZzX3mPH+JwP6eWFJyzPrh2SSU7:xYMZMBjI7UB2P0WRjrh
Malware Config
Extracted
redline
rozena1114
jalocliche.xyz:81
chardhesha.xyz:81
-
auth_value
9fefd743a3b62bcd7c3e17a70fbdb3a8
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
4600-139-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ