Behavioral task
behavioral1
Sample
1748-146-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1748-146-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1748-146-0x0000000000400000-0x0000000000432000-memory.dmp
-
Size
200KB
-
MD5
d6b225b39a71f6f1453bd07b8f632b3d
-
SHA1
3200592131556216201a54c24c98c523fad40511
-
SHA256
5ab27dec41d8bb1bbbba85fed2bf5604de637b82ea5633aea3908c98891a8f76
-
SHA512
91f4c54eaa0d9b1b0dfb29d2ad5895c0286736da72b91b48448b8094a79931c5e5969f79c251b5ee37f2ea505d9ce28cf5b474d2864a83221722f6bf459192a3
-
SSDEEP
3072:txqZWzvagwoMR3jMO+B8evJFhhjfxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jO1:3qZVjpULhh
Malware Config
Extracted
redline
crypt
176.113.115.17:4132
-
auth_value
407e05c9b3a74d99a20f90b091547bd6
Signatures
-
Redline family
Files
-
1748-146-0x0000000000400000-0x0000000000432000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ