Behavioral task
behavioral1
Sample
2444-164-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2444-164-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2444-164-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
41bbee179e641a53daa5e8780ea027a5
-
SHA1
06aad294c5c10e2e7794e3b33a7fbe47d9c8ecaf
-
SHA256
0bb97e02dc87210dd118795fe70a6cf0c9cb75175b656a0e31b55dda90a935d6
-
SHA512
84964b7bf09118285c144c26940af90c917ea90b5c26a338d8a467d15317a3b15d10d90906cf1e2236abab53c6b8344c786607d098737d5c0552206bae923dec
-
SSDEEP
1536:lJQLAPzqlVZRGWQ+arrjU71HaowLK4RXTGqV0buaQ+ggpDzO83wYkK8e8h5:lJQEPta79wG4RqqVMgJgpDzOg8e8h5
Malware Config
Extracted
redline
doz3
185.161.248.227:81
-
auth_value
c1561d003694a6e2b683d9d57d3f27fc
Signatures
-
Redline family
Files
-
2444-164-0x0000000000400000-0x000000000042E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ