Behavioral task
behavioral1
Sample
4412-204-0x0000000000210000-0x000000000023A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4412-204-0x0000000000210000-0x000000000023A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
4412-204-0x0000000000210000-0x000000000023A000-memory.dmp
-
Size
168KB
-
MD5
94f9027736f73797891670be5ab973be
-
SHA1
eac7798a5cba2d79c7c0367b45178f7308d31930
-
SHA256
4d9298f5b9b3017bbe84e4f47a232522a364b9fd7c8295e71ff9b64fd759ada0
-
SHA512
49f123ed6fd3e000f2f5dd82c221e3a8ac35382f31ab533b62796b48b20361cc249d3296b2dc628c43c62327512da81bcd5bd09f1a047ee987ac3b98870f0660
-
SSDEEP
3072:qV+m5c/QmRSNp2Tm1bENx3Gh6Zi8e8hU:qj2w+nGh60
Malware Config
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4412-204-0x0000000000210000-0x000000000023A000-memory.dmp
Files
-
4412-204-0x0000000000210000-0x000000000023A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ