Behavioral task
behavioral1
Sample
5024-133-0x0000000000340000-0x0000000000368000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5024-133-0x0000000000340000-0x0000000000368000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
5024-133-0x0000000000340000-0x0000000000368000-memory.dmp
-
Size
160KB
-
MD5
eb7036b9bf9f1c6a3f897ffb1fb1ec75
-
SHA1
0a972f4aa8385edb448fd0dd36df0835c715c54e
-
SHA256
fcf5452627ae6bef5c3cb1c7a97baaa08a06d964e318b3bc51d9b3eee254057d
-
SHA512
b657396f6da524b3f787aeb4df39d6ee1ccfae785a9a185f42e693387c085e2623be0f21213d72b640350176ed1eade75fd4206b57db9cacff4b8b84e099b9c9
-
SSDEEP
3072:KYO/ZMTFb7+aI4rin8eZA0VCe2xWF5gRXdh6SS4n:KYMZMBb7BIRLpClBdh
Malware Config
Extracted
redline
@madboyza
193.106.191.138:32796
-
auth_value
9bfce7bfb110f8f53d96c7a32c655358
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
5024-133-0x0000000000340000-0x0000000000368000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ