Behavioral task
behavioral1
Sample
1412-94-0x0000000000870000-0x00000000016E0000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1412-94-0x0000000000870000-0x00000000016E0000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
1412-94-0x0000000000870000-0x00000000016E0000-memory.dmp
-
Size
14.4MB
-
MD5
6866e8ad22be946a164ba3bebc09898c
-
SHA1
6038d69afa1267d61b274dfe0adea51adfd6d359
-
SHA256
2aaa75b4ee19271717495df84372924164d022c73d98c9da26651a8817b9985a
-
SHA512
f3f93f3a04529f298f89de94031feb36437b5243da602018e7ad01a7f9552bcb04c5dbfa4967c40d28670880dc04bf70fc60bee3450ca378812ff17333a9d8e4
-
SSDEEP
196608:5d7D1vhKC1aFYdHYGnDCCugu42Ea5IsfCz0vK0vYxlGKSm4FnwtKGTZuwfknfqj:LZQAdH/zfu3fnLAxEKS6HuJ
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.32.215.165:9203
-
auth_value
c2955ed3813a798683a185a82e949f88
Signatures
Files
-
1412-94-0x0000000000870000-0x00000000016E0000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ