Behavioral task
behavioral1
Sample
1940-56-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1940-56-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1940-56-0x0000000000400000-0x000000000042A000-memory.dmp
-
Size
168KB
-
MD5
a25d13174630af8cfc78d32c637413ea
-
SHA1
f79714c0476bf88eb8d9188a9034a48743a0d4bc
-
SHA256
52dcd55c2999261b859830667aaeb1d203ed6a390727288ab0649b107951a4b3
-
SHA512
59a15b5e0292089f5cf340063881d997f12e899a0f4a210f075381c6b6ecc15763bab91b2e1e573f0105dd31003e392e7d7c1fc1096e104d93b5e8a41dc25374
-
SSDEEP
3072:7V+m5c5QmRSJLiruVyrKfhvh1ZS8e8h+:7j8w0Mvh1o
Malware Config
Extracted
redline
@CLOUDCOSMIC
157.254.164.98:28449
-
auth_value
c8ced34a15f6ccc97625aee05a0d1951
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1940-56-0x0000000000400000-0x000000000042A000-memory.dmp
Files
-
1940-56-0x0000000000400000-0x000000000042A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ