Behavioral task
behavioral1
Sample
1240-57-0x0000000000080000-0x00000000000C6000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1240-57-0x0000000000080000-0x00000000000C6000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1240-57-0x0000000000080000-0x00000000000C6000-memory.dmp
-
Size
280KB
-
MD5
8971b5f70929cde5dc829e4d4bc27b8c
-
SHA1
d9e241b01aa5275a51cec137ca5905aa5278f85a
-
SHA256
72adfa9c60e21ac4db6dba8c9320d64f1b8cd8520bf92494b224759343f610b8
-
SHA512
f2e937c2408f2ffef24146d0c93ce37843568c50df626a7a042f58462a649506a6d9761273278d63f23dd16e06c8f8a9ee91d76482f80752a7d57356889b137b
-
SSDEEP
1536:AavSQzahCl/9zEKKkLAS3mAREsVKCrbVgSNJNSI3qzSP:VvSzgyKjA2zTvXCiJNSIaz
Malware Config
Extracted
redline
25.03
37.220.87.78:25387
-
auth_value
5cfc89aee6c1fd926c66b4cb6c07caa2
Signatures
-
Redline family
Files
-
1240-57-0x0000000000080000-0x00000000000C6000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ