Behavioral task
behavioral1
Sample
396-208-0x0000000000610000-0x0000000000638000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
396-208-0x0000000000610000-0x0000000000638000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
396-208-0x0000000000610000-0x0000000000638000-memory.dmp
-
Size
160KB
-
MD5
3d3861f9464ca1e0fcb79c0d7dc62e9e
-
SHA1
54787bdc9cee1c10d2b69a032c6056f4856d747d
-
SHA256
8aeba070434b175b3532ba6ff790c2aabca3e40ddad18be9d6ce65354cd6c9c5
-
SHA512
23c7828465d504bca2e8d74adcec92df15b27efbcf39cecfeecb3c927ecfe742f001c98cfcabd129f92ed0b3fc87f13bd8a87e5886ab4c153f0c541db6686f27
-
SSDEEP
3072:UYO/ZMTF8r+sIjLHyGkV7FzsEWFqygXShySSwU:UYMZMB8r3I/IoE64Sh
Malware Config
Extracted
redline
a4
65.21.133.231:47430
-
auth_value
770e1e7fb0781851d5e2e8f9e720e0dc
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
396-208-0x0000000000610000-0x0000000000638000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ