Behavioral task
behavioral1
Sample
1232-57-0x0000000000340000-0x0000000000368000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1232-57-0x0000000000340000-0x0000000000368000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1232-57-0x0000000000340000-0x0000000000368000-memory.dmp
-
Size
160KB
-
MD5
509aa9272b0fbb53ad25557f51024c73
-
SHA1
3a727894896c90b4233819434fc8ebdf249e7970
-
SHA256
6a9b24b1da4935f67f957052275a44bae6ede6a741d3d65d7bec614bb7ae1f70
-
SHA512
e5abaae3b7828b1e1c8505e9f2fff0958cbbc576756aa1400c716914b182b989572cb042ca5b3556b8e4d7a593205bdb11a48363cd738e91d99baa553d60b013
-
SSDEEP
1536:MSGETCdtRendbACO/H65LT/FnP3U1fDPG2fAUODxUibuc+uMPjioK0wuei1eb3dP:DGEMuTQIFM1jlAFD22FjwioKhJmfM
Malware Config
Extracted
redline
185.215.113.69:15544
-
auth_value
d5bb3b8d0c76033fc29ceaafe9697c2e
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1232-57-0x0000000000340000-0x0000000000368000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ