Behavioral task
behavioral1
Sample
364-81-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
364-81-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
364-81-0x0000000000400000-0x0000000000450000-memory.dmp
-
Size
320KB
-
MD5
e9ec25a5f91aa0a8dc135bfbe364d258
-
SHA1
52a8768b9b5b54697be5722ff7936ea2dc9c8940
-
SHA256
b6855cc586db692005a436ed14bb49ddd325a0e9beb941701e0cc57d744de093
-
SHA512
7e85cadadd54a88a8aa0fbf5093f98fa48971d142b74effb069ff2c5c604e2ae83daaf1329fe47fa528a9b20063d4545f13676b9d855f5e047eda52ef5d00d84
-
SSDEEP
3072:tDeLo8WGo/MpcqVIQWRWW3zGSqkSoiZTty4W:tDeyhPbrjGSqkSoipty4
Malware Config
Extracted
redline
VEBO.01-06_H
50.114.39.71:10576
-
auth_value
4baffaf63b3dd023176c1aae4d99ad49
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 364-81-0x0000000000400000-0x0000000000450000-memory.dmp
Files
-
364-81-0x0000000000400000-0x0000000000450000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ