Behavioral task
behavioral1
Sample
1972-55-0x00000000047D0000-0x0000000004814000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1972-55-0x00000000047D0000-0x0000000004814000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1972-55-0x00000000047D0000-0x0000000004814000-memory.dmp
-
Size
272KB
-
MD5
c7df82e9707198858726046eda8e9626
-
SHA1
60e4c082b94948835c775fcab62bb7b1db36bf02
-
SHA256
3904397951de83f5cc35ec17d878af414aaf9cd949267825d2855b34c2d4ed4c
-
SHA512
a0733806a4560bb17020f45649a8c6c18916d38ab60b1a92512272b6c8530417053d9748955195b82f0be0aaa4d1cab8614463144bc1b82323842997040a227d
-
SSDEEP
3072:D6jgELx6GNZCMS5qf0Qk+QDxvLy9KaLo401yhLhsZnnEhxNn2pU9f2MKTV/wi4ly:D6jdF5sQk+QlvLyoaLLhCn
Malware Config
Extracted
redline
new
176.113.115.16:4122
-
auth_value
0ae189161615f61e951d226417eab9d5
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
Files
-
1972-55-0x00000000047D0000-0x0000000004814000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ