Behavioral task
behavioral1
Sample
1392-135-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1392-135-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1392-135-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
7ea182dd5d0f90227b8549da1c96bf84
-
SHA1
409b328a1adc08df1c7b4dc28401692c769e7736
-
SHA256
472884bad51c4fdd25de7fd2c4aab4966bc5d647002cdac927a9c910db109fb5
-
SHA512
1f1c05e5fdcb7777fa2ac6e0369db131a2c6d875bf7028e171b95fe00dd3b5ecffd0c1ed8d19ba6eb92dbc48ef901d9541e64e3d37cd3e5fe2c5ab4e2611bca5
-
SSDEEP
3072:RYO/ZMTFFh+FowLZQxUOZ+LSujzvzWF4nRX4haSSgS:RYMZMBFhWoSQSbjzrBB4h
Malware Config
Extracted
redline
USA
109.107.191.169:34067
-
auth_value
efb1b17e182f1e7cdb54a3e91436c48c
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1392-135-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ