Behavioral task
behavioral1
Sample
844-62-0x0000000000400000-0x00000000009E0000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
844-62-0x0000000000400000-0x00000000009E0000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
844-62-0x0000000000400000-0x00000000009E0000-memory.dmp
-
Size
5.9MB
-
MD5
1f0022a9ae7a65a9601d3e838419289f
-
SHA1
65320656ea51cddc7e33eb84511bb53fcaa12a7c
-
SHA256
5ab4fd55b79618d7e8783a29f31c4faf1eb28c148bd5137bcd3f843632bba855
-
SHA512
89b71a096f66d1ffa37c3a256a207739b59bd119f083e4d130ae3272611386f47c746822c0c6c88207f589cc65995354560e58cd38da581df51a69cc556fdd80
-
SSDEEP
98304:rKdA8NW5sol8NJ4RWTiuGa8D9NwH7j5YsNYFLODi/yhS6MHMQaGNLL/C7smplX:2y5s9P7iRbD9ubj5YPFLVqSbaGNLGQol
Malware Config
Signatures
-
Redline family
Files
-
844-62-0x0000000000400000-0x00000000009E0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 139KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
� ��5�� Size: 36.0MB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mrjgczkq Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
orizhnba Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE