Behavioral task
behavioral1
Sample
4852-146-0x0000000000620000-0x0000000000680000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4852-146-0x0000000000620000-0x0000000000680000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4852-146-0x0000000000620000-0x0000000000680000-memory.dmp
-
Size
384KB
-
MD5
8f6000193ad16224790f4aab6cf4d1b3
-
SHA1
60960643c66df9db7ea44bf20b8329278461fa05
-
SHA256
78ef26d621824640f58ca2f8eb88562aa4c9bff0d2cc0e37bec314f0bf4aaab4
-
SHA512
4b1c0e74c2174f0017ab3f915c2017756410452d40ed634727ee7c3c1c3f3c11d8934266f0c498d281c1accccd182e0250ef58d7a75ba1a1c7258d000fe82d72
-
SSDEEP
6144:rdmub3lTEbu5pw2hl0aFypvtphfb9NV46zGfH1dS3eFTJVwVKmh8LFRxNyJJXBBN:ZB7ah2hSEypvt71MoelJVwVKmh8LFRx8
Malware Config
Extracted
redline
mario23_10
167.235.252.160:10642
-
auth_value
eca57cfb5172f71dc45986763bb98942
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
4852-146-0x0000000000620000-0x0000000000680000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ