Behavioral task
behavioral1
Sample
1416-97-0x0000000000460000-0x0000000000490000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1416-97-0x0000000000460000-0x0000000000490000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1416-97-0x0000000000460000-0x0000000000490000-memory.dmp
-
Size
192KB
-
MD5
112b5dac333641251a90c57626725f18
-
SHA1
71cec6f62dbac29d115d979476f341e2f66c304e
-
SHA256
241345ee4e75d3d896adf1539aa37d6b5918f9c2f59a3a6e988b14bfd4e2b914
-
SHA512
cefc075ec76b8b077a8f9cdf9021855e7edc088d007a4ad9779348dabbaf4b6c897969ecebb9a6dcfef2940ed7d9351987ed1a3289f5009a2d598d32f09f72dd
-
SSDEEP
3072:24tDiwyqSVghBGfAGtTjxNKifvWPxn28e8hy:DibuhM5ZmnPxn2
Malware Config
Extracted
redline
rovno
83.97.73.130:19061
-
auth_value
88306b072bfae0d9e44ed86a222b439d
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1416-97-0x0000000000460000-0x0000000000490000-memory.dmp
Files
-
1416-97-0x0000000000460000-0x0000000000490000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ