Behavioral task
behavioral1
Sample
1916-132-0x0000000000090000-0x00000000000BA000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1916-132-0x0000000000090000-0x00000000000BA000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1916-132-0x0000000000090000-0x00000000000BA000-memory.dmp
-
Size
168KB
-
MD5
ceddfcb7c85f3f1609bd7d006b89e2b9
-
SHA1
8c00b2f455e874252b68230dd21b59d93ec239f7
-
SHA256
e0ec3dc4fc4ef5de852744d5ab63215e3d8ddaec968d34ede034def2db8d67cf
-
SHA512
80ed14ae86c4d661b70cb4c7f88a1d65c45f25b6b66cba513fb874599f28094fe8bf1224c4eddf64d0b4cfcbe57a3a1214dfa4e128523bd06851883cb05e3884
-
SSDEEP
3072:WV+m5chQmRSZqThZlaiWM6hqhUZd8e8hA:WjEfb3QqhUL
Malware Config
Extracted
redline
mesu
83.97.73.122:19062
-
auth_value
8ede6a157d1d9509a21427d10e999ba2
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1916-132-0x0000000000090000-0x00000000000BA000-memory.dmp
Files
-
1916-132-0x0000000000090000-0x00000000000BA000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ