Behavioral task
behavioral1
Sample
4300-144-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4300-144-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4300-144-0x0000000000400000-0x000000000041E000-memory.dmp
-
Size
120KB
-
MD5
3706d3b70014c09fbdfd7b27e234198c
-
SHA1
9d07f6194ec5679585a0bf34f8785e168b78e7af
-
SHA256
2208e3145499ea0f1ad8f74c0535af5fdd34ba2c84bb9bc9a4c0ee9f34660f90
-
SHA512
a51dd19757e947d59db29e77a8155dd3ea0136e727732a7960564e92161683c463873f55a59f16d074426eb0c75caa7ba3c7146415bb8cf57b43b249ade39f2f
-
SSDEEP
1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed25tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdpY
Malware Config
Extracted
redline
Muckk
3.66.213.216:60782
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
4300-144-0x0000000000400000-0x000000000041E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ