Behavioral task
behavioral1
Sample
4004-214-0x0000000000340000-0x0000000000372000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4004-214-0x0000000000340000-0x0000000000372000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4004-214-0x0000000000340000-0x0000000000372000-memory.dmp
-
Size
200KB
-
MD5
71c5228bd44ad525a911e89f94a2c7cc
-
SHA1
868601899a8be90a01f1fc77ef6e8e77d221116b
-
SHA256
1208a0de5c19f053bd06bf4a853cff7701bde7191a0794f4f4614043240359ec
-
SHA512
e883eec82fe77005752350f8cad7da88e8a261663957f2a53884c385b76d464ba6ee2c26f061fa9e3c15b7eeec904dd75ea0f42a06a4bf118863e2a4d77b593a
-
SSDEEP
3072:vxqZWxRanU2n0UIel59QhvTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+caj:ZqZoU5Qh
Malware Config
Extracted
redline
temp45645645
82.115.223.9:15486
-
auth_value
f7fe7a35c673cce3fa35569cf455f570
Signatures
-
Redline family
Files
-
4004-214-0x0000000000340000-0x0000000000372000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ