Behavioral task
behavioral1
Sample
3808-143-0x0000000000360000-0x00000000003C0000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3808-143-0x0000000000360000-0x00000000003C0000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
3808-143-0x0000000000360000-0x00000000003C0000-memory.dmp
-
Size
384KB
-
MD5
a3a01a24364e2e8897d82173e6c32cff
-
SHA1
fef611f78b9fe0560576c1336c588a861c2bee79
-
SHA256
cf4675afdfbe4242d686ec59a037b1daf4460849799de95a6293e48ced39f803
-
SHA512
672484cf94eedda8deacd41f2c828281ed3d368df278a5f4c09f8f25c397f15f2c4d05e82e5cfdaa7c34cd28e33f75661f7498db467d92a00ed92b14615f2ed8
-
SSDEEP
6144:Hdmub3lTEbu5pw2hl0aFypvtphfb9NV46zGfH1dS3eFTJVwVKmh8LFRxNyJJXBBN:9B7ah2hSEypvt71MoelJVwVKmh8LFRx8
Malware Config
Extracted
redline
mario23_10
167.235.252.160:10642
-
auth_value
eca57cfb5172f71dc45986763bb98942
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
3808-143-0x0000000000360000-0x00000000003C0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ