Behavioral task
behavioral1
Sample
2032-66-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2032-66-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
2032-66-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
f40578f4d0fbc88861dd0ffe7de0a25e
-
SHA1
9fe370eb62649922b673b197fb9a0aab3ea566e8
-
SHA256
4eaf85921f9c98f3455157e962f8d7f5209dd39bcd34228a1651d5b41ddf0ece
-
SHA512
2413390d423f3c265eed9972aa8c35e2bf5582f13810d446a8d3a084d78825af06f5bbf9f558bc1e2898c30e2871cdae5db181c9587c345cb2a18ffe1b12e0fb
-
SSDEEP
3072:4YO/ZMTFHX+2IQj/93IB8JWolWFK/RPAhcSS8K:4YMZMBHX1IQdIkBpAh
Malware Config
Extracted
redline
11-25
172.99.189.117:44670
-
auth_value
f3754aeb17f33c672540bd6f71407965
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
2032-66-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ