Behavioral task
behavioral1
Sample
2040-56-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2040-56-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
2040-56-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
b7db08b64f5d13ac387c5579c6506513
-
SHA1
5db3463a28d1fc9a8fc097e43142173b2e23eb17
-
SHA256
6edeff81804e16afc174800f4bc60c578818579d8d5f2a71deb5eba15f3c48c5
-
SHA512
6d7f5d9ee0979f57ddbb8ad9563e65fe4607195e9b96fb71a464414a91c8002ed0f445623c2785512af00b2f4e35609d8bcda8c63e5546d105b0620b730db70b
-
SSDEEP
3072:FxU1n38g8Wm5ghg+L+qVSA3sgAZh48e8hY:Fx8n3Qa+5ciZh4
Malware Config
Extracted
redline
3005
176.123.9.142:14845
-
auth_value
213a2282a7fad0afc0f3a4475e58c7dd
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2040-56-0x0000000000400000-0x000000000042E000-memory.dmp
Files
-
2040-56-0x0000000000400000-0x000000000042E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ