Behavioral task
behavioral1
Sample
1600-141-0x00000000001E0000-0x0000000000210000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1600-141-0x00000000001E0000-0x0000000000210000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
1600-141-0x00000000001E0000-0x0000000000210000-memory.dmp
-
Size
192KB
-
MD5
208af219100c20e79f995e8425f09ddd
-
SHA1
a6f93de82fa54c1a14640a764ae3bf0623e756a4
-
SHA256
474636746b3683591edbf68da7bf767925172a6941107a883477aa61d0817452
-
SHA512
b41889b622020a8071a649416d2332dfec47c4e5f3566770d00ffd9638a3a5080d43e444b50b4534ebb76f59967452467fc87f9049b0b60a6958280c2b952e4c
-
SSDEEP
3072:2NtDiwyqSVghBGfAGtTjxNKifvWPxne8e8hy:GibuhM5ZmnPxne
Malware Config
Extracted
redline
rovno
83.97.73.130:19061
-
auth_value
88306b072bfae0d9e44ed86a222b439d
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1600-141-0x00000000001E0000-0x0000000000210000-memory.dmp
Files
-
1600-141-0x00000000001E0000-0x0000000000210000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ