Behavioral task
behavioral1
Sample
1956-163-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1956-163-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1956-163-0x0000000000400000-0x0000000000432000-memory.dmp
-
Size
200KB
-
MD5
3969c82756a217d0397cd1d593a3b2d9
-
SHA1
9a4658ad8a1917a741db5693049422e8bd59ae82
-
SHA256
1ac3472a30f784bf96f5a59df1c2c91497ab9161694992116138543f554298ec
-
SHA512
889ef140e9013aa8c2268715231687de62e2dcd1159777aec1106a773fd39341caefed102d441d4ce64dcfe13ef005e687b9f2c0236a32daf64aca31a230cd45
-
SSDEEP
3072:jxqZWjfa8oty3i5dtqOeT5FihpvxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOud:1qZCKraih
Malware Config
Extracted
redline
clean
185.254.37.212:80
-
auth_value
5ff69ff01ad671e755bfff05fc9140f1
Signatures
-
Redline family
Files
-
1956-163-0x0000000000400000-0x0000000000432000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ