Behavioral task
behavioral1
Sample
4580-134-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4580-134-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4580-134-0x0000000000400000-0x0000000000448000-memory.dmp
-
Size
288KB
-
MD5
6014413d4dbf8da6c4c6375e8298e68b
-
SHA1
62bab754c7cff62da836314a6995c357a4ec6c50
-
SHA256
b9317598a058bb1f00187aae60d4ecdc210b60de92208a7375729f215c0958af
-
SHA512
afec649a1c502f5926903e91e090adddd3fcd533d20a2529b756febb6366b06662d9a71e3605e25faa17c50ad0ff504303f9645e5b26c6c8a5dbc2d8781c359e
-
SSDEEP
3072:ExqZWjHaJIppUZJpM68ImeiE9bhxaNzXcQfr93f/XvS9D7ZZ/0daoWep6jTwC5wj:aqZ3ZJpDH5bhojcQfRvS9HDkWMww0w
Malware Config
Extracted
redline
Zhannet
109.107.191.169:34067
-
auth_value
cbbb687b4d3fbd2e8e326586352fc821
Signatures
-
Redline family
Files
-
4580-134-0x0000000000400000-0x0000000000448000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ