Behavioral task
behavioral1
Sample
1324-59-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1324-59-0x0000000000400000-0x0000000000428000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1324-59-0x0000000000400000-0x0000000000428000-memory.dmp
-
Size
160KB
-
MD5
f49d1fd63d4989d35b7f9a121ebce52d
-
SHA1
cf006d41ce12ac4affbae6be14522ce30014f124
-
SHA256
f53cc15953654a8f635b2715fb53834d264e93ea5de1a32388cd2d863528ec5b
-
SHA512
a8c94be4d9a484ab59336c7109dafef94ab67dfe2b3bef50f6ee125fc875a2eb74a9de236b2470fddb569b621224687457925333bb151213c97c61ac5d016f70
-
SSDEEP
1536:PSGETCd7RendD8iFihA6e/ZzNNPbvnASSyqHXOKXfAUOwh/buc+mMPjWQB0wueiJ:KGEGuD8iFidSHvcyrYAFwhzFjwWQBhC
Malware Config
Extracted
redline
168.119.228.126:11552
-
auth_value
4d265d97daa689f979857b5ff624933b
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1324-59-0x0000000000400000-0x0000000000428000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ