Behavioral task
behavioral1
Sample
4852-250-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4852-250-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
4852-250-0x0000000000400000-0x000000000042A000-memory.dmp
-
Size
168KB
-
MD5
1191701a247f8b8c2a851cb43c16e665
-
SHA1
131f4945f3663556ada274314d1597ef0e0b4899
-
SHA256
e7a055a8499b19108462c08f158725091980a13543dcf821b21d055761a9bfa5
-
SHA512
b4019187850e5a0b930c898951ac99ca19a5e48e1bd992b736f2c843847e01973a30d1dbd0b9728d569607e3b19fc341b3d8f48fad4566e0c54c23b7f9d56782
-
SSDEEP
3072:JV+m5cRQmRSZjGkkXFrSjZ8l9hXZh8e8hJ:JjUbN19hXL
Malware Config
Extracted
redline
jamba
185.161.248.75:4132
-
auth_value
b01bf275593de07ba204560db44b861a
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4852-250-0x0000000000400000-0x000000000042A000-memory.dmp
Files
-
4852-250-0x0000000000400000-0x000000000042A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ