Behavioral task
behavioral1
Sample
4248-138-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4248-138-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4248-138-0x0000000000400000-0x0000000000432000-memory.dmp
-
Size
200KB
-
MD5
ab0b6ddb444f17a8a75c3a9f3d5f6dde
-
SHA1
48976f802b67011c8507c092c758006a7301f4b1
-
SHA256
df19ce9e782093c8eaa3980b75cb1749b92043022701ee59cbe403899ab7a32c
-
SHA512
d950a6935f84adcea012627ba8bd5fb49c6d515afed59942a59bf42df8de6020942f02542ed0e84f499131f61d5dfaa789d5b922c67b026ee0b1318b705e48ca
-
SSDEEP
3072:CxqZWXzaWAtdsw7xSeJZeDp9EhdnxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOK:wqZgw7xLJYEh
Malware Config
Extracted
redline
@x1ps0ff
45.15.157.131:36457
-
auth_value
b28d2ee0ea17b7dd28ab2361f286e4a8
Signatures
-
Redline family
Files
-
4248-138-0x0000000000400000-0x0000000000432000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ