Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
General
-
Target
tmp
-
Size
137KB
-
MD5
39c717141fa3575199479d2a7f9cbcdb
-
SHA1
230e3e780964f9979b2cb47397c1a75cbfffe117
-
SHA256
3441c745b1c8814451c1ec63e2dea4495cdc772c8592fafbf23ec84793bbfb22
-
SHA512
177744114c0c41cc0198629da65b2bbb8f600a0a4f4f7b10d7644c21d92fb72a5faf3c0fd92a72f4811d8b7dc6b192a2338d15113ce24ae3e1d162a88b255514
-
SSDEEP
3072:+YO/ZMTFBV+6InzatLfJCCvmTOWFDyRP/hxSSg6i:+YMZMBBVRIG1fJcO5p/hH
Malware Config
Extracted
redline
slov
31.41.244.14:4694
-
auth_value
a4345b536a3d0d0e8e81ef7e5199d6d0
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ