Behavioral task
behavioral1
Sample
308-134-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
308-134-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
308-134-0x0000000000400000-0x000000000042A000-memory.dmp
-
Size
168KB
-
MD5
e263a0a108ef9fb8f74031b2cfcaf0cc
-
SHA1
83e2d6c782b33997378a2eeaa1605e3ac8d62162
-
SHA256
8bf9c0b4d91336773d010e670d59c742ebbed4fe2b2a657aff4d5ab7452b69a7
-
SHA512
53884269033e103f3e1aacb730f5bcb7384eee3b4cbb48ff8349f4ada645f6ee43ca653edc3c92c36d0eeb8c34be7ffe0bf22ef5b4c45d2b17d756e1fa9a6c16
-
SSDEEP
3072:PV+m5c/QmRSNZN5oazQ6ipmzvlhyZ58e8hY:Pj2AzQ6nlhyj
Malware Config
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 308-134-0x0000000000400000-0x000000000042A000-memory.dmp
Files
-
308-134-0x0000000000400000-0x000000000042A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ