Behavioral task
behavioral1
Sample
976-243-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
976-243-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
976-243-0x0000000000400000-0x000000000042A000-memory.dmp
-
Size
168KB
-
MD5
8d92b208b53e4bbe56c21217981233ba
-
SHA1
2e89d5b90265fa7ff77578acb1cf5bf37d5a6180
-
SHA256
c74aa648db150c7779fbf2dfe8a5d1fc565a7faf1d89bced7ecf0814c9bba989
-
SHA512
475026b2d91db06035d6d04f1667c5429cb7cacb5ee39965eea5beefb346e49ab80003b3a00a74324a8f8dde49a0af6d09bd98fa24f1381f4d7dc3c0e28cd587
-
SSDEEP
3072:kV+m5c9QmRSRomMYCMeUWNgBhhZa8e8hR:kjAdB0BhhQ
Malware Config
Extracted
redline
rumba
185.161.248.75:4132
-
auth_value
35dbb4006087a5d5c211b21be41adb90
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 976-243-0x0000000000400000-0x000000000042A000-memory.dmp
Files
-
976-243-0x0000000000400000-0x000000000042A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ