General
-
Target
main_payload
-
Size
199KB
-
MD5
83d5ed4646e857589e49cd0e5190557f
-
SHA1
6554d9fadbf46a767e8726582f693fd57b1562e0
-
SHA256
16584a2eadbf6651308501554610ce989575ec14762b55f5440a54e690af8943
-
SHA512
fa6dc67bd9cb1c5f458ff0d35ff6b9a807e56ccdd22d2b23338946d84caf125542985b4d9ebf113a81587b9abfa0f2ac0f68114ee61754037c1f8af868ae6ac3
-
SSDEEP
3072:5gH+U6pYQQqUOIe9X72tZ3/k05r3krzpiue:5gH+yQqeELOz
Malware Config
Extracted
redline
@legeeeendaa
79.137.192.20:7466
-
auth_value
1fc791091d690f6bc50985a8f767f251
Signatures
-
Redline family
Files
-
main_payload.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ