Behavioral task
behavioral1
Sample
1640-217-0x00000000010B0000-0x00000000010E2000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1640-217-0x00000000010B0000-0x00000000010E2000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1640-217-0x00000000010B0000-0x00000000010E2000-memory.dmp
-
Size
200KB
-
MD5
b89f7caec5402b77e1f1148c6ff226fd
-
SHA1
ea3409401af3020eefa56a1eca889ddc351f2396
-
SHA256
bc508c4cf0fbc302adcfef7b9a885077a39bcf2e33e04e8490358ce63cdecf58
-
SHA512
3a7bf9d721b8feeef060a054b468c598ebad829acf6d766364989e71a8ae4ab6de569de8e5ad61f7d0eec7a38de6b3db0f08ff5acf614fea6ffcc00e2a3adcf5
-
SSDEEP
3072:7xqZWPTa9ApGvgiOTcdkeZ59xhmzxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOF:NqZvgiO6Jxh
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
Redline family
Files
-
1640-217-0x00000000010B0000-0x00000000010E2000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ