Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
General
-
Target
tmp
-
Size
175KB
-
MD5
ed98d89ee3ff45670756e8dda4345b62
-
SHA1
d8cef7e32b2261447f3e53617a1d53647e4dae6d
-
SHA256
18b11eae56eaa7b76512c5e88aae06fda4faebbd477c01e837f5ca1b3ffd1985
-
SHA512
7d89e36c3b79f4862da2f4a39c29b96c125b72a94e2ac2e01a1327f2930d04bfaa853abbab789dfd2b8e9de8105c943731da838ea9efb2d9133292304297058a
-
SSDEEP
3072:KxqZWJBaKULo3xj9peT5FGhMXxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+O:4qZIxjeGh
Malware Config
Extracted
redline
gonka
62.204.41.170:4179
-
auth_value
f017b1096da5cc257f8ca109051c5fbb
Signatures
-
Redline family
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ