Behavioral task
behavioral1
Sample
848-158-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
848-158-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
848-158-0x0000000000400000-0x000000000042A000-memory.dmp
-
Size
168KB
-
MD5
f6386a3832e872bdeffe454b517e42c9
-
SHA1
182611773db8d6a4325b4c679a2ea6f473a2bfed
-
SHA256
75731e456fa37d6c6cbf74a882eda8c396d487caf2cd4e1351b26d620b3aabbd
-
SHA512
f1c1550f634922b54d4588524ebd6fdc7c9f781de579997d6489a7b4776b84a792193bb54adc0bf1d6728fff36c56d8314e3c820fc2e52a268b2e2b63af91add
-
SSDEEP
3072:bV+m5cRQmRSZjGkkXFrSjZ8l9hXZh8e8hJ:bjUbN19hXL
Malware Config
Extracted
redline
jamba
185.161.248.75:4132
-
auth_value
b01bf275593de07ba204560db44b861a
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 848-158-0x0000000000400000-0x000000000042A000-memory.dmp
Files
-
848-158-0x0000000000400000-0x000000000042A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ