Behavioral task
behavioral1
Sample
1652-242-0x00000000010A0000-0x00000000010CA000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1652-242-0x00000000010A0000-0x00000000010CA000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1652-242-0x00000000010A0000-0x00000000010CA000-memory.dmp
-
Size
168KB
-
MD5
3a4c2444352eb0d009c14bf252040b81
-
SHA1
78eb6d3febb8a330b25c386e02f2d62239035f53
-
SHA256
d4736d4ca10ea8c434c3bc9eba21329e3943f51298f3cb10890ebb13d79131f4
-
SHA512
35303fddde978b83aa9606da5024dff3f557cf9ec3bdf167c0d130586e4822eb09975083018d1785bafddfe964a1741c891ef14981ea58049e1fabdf816524ab
-
SSDEEP
3072:HV+m5c9QmRSRN8YNkMaJScaqhKZy8e8h4:HjA9BMrqhKo
Malware Config
Extracted
redline
dama
185.161.248.25:4132
-
auth_value
d8b2637e0546aea3944c251022b63e77
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1652-242-0x00000000010A0000-0x00000000010CA000-memory.dmp
Files
-
1652-242-0x00000000010A0000-0x00000000010CA000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ