Behavioral task
behavioral1
Sample
1460-55-0x0000000000090000-0x00000000000C0000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1460-55-0x0000000000090000-0x00000000000C0000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1460-55-0x0000000000090000-0x00000000000C0000-memory.dmp
-
Size
192KB
-
MD5
39c7e886a19acc17e3ad041928647d4e
-
SHA1
915cb56caba172d686553da49bbcccaa1c42f27b
-
SHA256
ca10d7c23c263e0b67764646ac317d0ad6e3dc54dce1491366ed63637be309b3
-
SHA512
f1d4ba1e022c39c9582002c95e1d942ed5ec253828d28abcfaa4502e39fa2a2a960860853d3341e302a7fd1025a0ee4969bc190a9ec5f2cddff064ecc72554bd
-
SSDEEP
3072:mhQl5dZZijmGMExNS+yenXbZq7V/DA8e8hR:mh2ie5eXbZq7V/DA
Malware Config
Extracted
redline
2
95.216.249.153:81
-
auth_value
101013a5e99e0857595aae297a11351d
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1460-55-0x0000000000090000-0x00000000000C0000-memory.dmp
Files
-
1460-55-0x0000000000090000-0x00000000000C0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ