Behavioral task
behavioral1
Sample
2032-62-0x0000000000400000-0x0000000001D12000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2032-62-0x0000000000400000-0x0000000001D12000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2032-62-0x0000000000400000-0x0000000001D12000-memory.dmp
-
Size
25.1MB
-
MD5
1eaf642aeab09000fe37e5485516ded3
-
SHA1
34ade6dece129b6ca4c0f817cbd043db25157487
-
SHA256
d13d31cbe0e3fb46afe90f0fbb5cedac53837f54c645af1c0c83c486f8c0e7c2
-
SHA512
2b5836e46aab65c3c3143874e1cdb23e756e13078e6a72bde3c27e98b9c7b98d2fc980894cd8f8f033b84cf83f60fe0fd2a376eb91798277db267c4918671113
-
SSDEEP
196608:sKVwnn9WB3teHPIAXGzbjWPQ+MLyxwoxcdAEHbhudUsh6Y5WZQnUrOL0xk6hPrpj:1VpIIAYKVlmjFIh69PSZTnTM
Malware Config
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2032-62-0x0000000000400000-0x0000000001D12000-memory.dmp
Files
-
2032-62-0x0000000000400000-0x0000000001D12000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 45KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 372KB - Virtual size: 388KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 191KB - Virtual size: 19.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE