Behavioral task
behavioral1
Sample
2952-163-0x0000000000940000-0x0000000000968000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2952-163-0x0000000000940000-0x0000000000968000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
2952-163-0x0000000000940000-0x0000000000968000-memory.dmp
-
Size
160KB
-
MD5
057db21bbf0a03f3bbbaf3a5abf5d925
-
SHA1
927fd93cad45d842589b8517b85ee02db851e85c
-
SHA256
fcb9a2faeb23511984966d70d5e1bf2f30c6b49a5ac708e5cf4dc66416aadc3b
-
SHA512
a0a9f1c1e96e66b334bd98b1b34877fc9e98b69bd110a694ebe79407e87452284cc390b9d44ffdc254e8a382eb65c53a517429b15eed189c5f142c2131099ba7
-
SSDEEP
3072:LYO/ZMTFvU+7IgLhGCK7H+J3EpG9WFzyXPdh3SSEt:LYMZMBvUsIyS70p9/fdh
Malware Config
Extracted
redline
new
chardhesha.xyz:81
jalocliche.xyz:81
-
auth_value
0ae189161615f61e951d226417eab9d5
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
2952-163-0x0000000000940000-0x0000000000968000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ