Behavioral task
behavioral1
Sample
3324-360-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3324-360-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
3324-360-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
e2253faa8c7c76efa83d582f82e53570
-
SHA1
44e1f7c72e92f200a3243c85248f5145f977a082
-
SHA256
33cad30a6be0587528f565e72b96ec079b1efd0b16dbc7fec58d4ecc1666355f
-
SHA512
46f277062d471c989f0a3a78a196abada93791fe7ff1d39b7796580943098ade2c7be46280c2798ee46ccc0c3bc6f7ea1a6059a5cd2fef2d09a7354a1178994a
-
SSDEEP
1536:d3xqdqlVZRGWjpjtrJbS+XdpxOz35HoBtTGqV4buSDnDbY83wYkz8e8hA:do4prW+dpxe35SkqVoPDbYV8e8hA
Malware Config
Extracted
redline
build03
65.21.3.192:32845
-
auth_value
688766d7eb9d4a5fde1dec6cdf7c3d9e
Signatures
-
Redline family
Files
-
3324-360-0x0000000000400000-0x000000000042E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ