Behavioral task
behavioral1
Sample
3744-158-0x0000000000400000-0x000000000045A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3744-158-0x0000000000400000-0x000000000045A000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
3744-158-0x0000000000400000-0x000000000045A000-memory.dmp
-
Size
360KB
-
MD5
f83a45c557efcba23cbd5029970c9387
-
SHA1
e2d566d32d36d34b9bf8ad3548fee089b9ee7b80
-
SHA256
045a04791bf2061cf4bad21f935bb85e2be6bb15d82b7f3986d6e823fbc7e31f
-
SHA512
05dd466da648e32b278391c867abf94f287d67c2c5646975e040528c4eaeb5d4e13455e423d90abb5711fc14625f2bb9cfcf0d40f42607e4fef59181880135e2
-
SSDEEP
6144:BGNHqE87fMUB/563Waf8ibzC1w+snbZ6TEGfHO4l8cPV/7ry:0+D5a+snbZ6TEGfHO4l8cPV/7ry
Malware Config
Extracted
redline
vip
176.123.9.142:14845
-
auth_value
04988fae39606b9c65a0cc86dfa46c41
Signatures
-
Redline family
Files
-
3744-158-0x0000000000400000-0x000000000045A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ