Behavioral task
behavioral1
Sample
1660-123-0x00000000003A0000-0x00000000003D0000-memory.exe
Resource
win7-20230621-en
General
-
Target
1660-123-0x00000000003A0000-0x00000000003D0000-memory.dmp
-
Size
192KB
-
MD5
b72ade68e15e1ceaa5362e094096b55e
-
SHA1
73301a486e0fb5c9bca576e277862381911acd36
-
SHA256
1bc86aead90a68de6c647894997f66d663a4eb0d4fe0d2286ad7c312c425bdf1
-
SHA512
c14c75a53894c75f26e3eb8416dc8f80e6af39cebf97f7e518847c21d66b579c838489e5bc052a23b6542263a3f08273e38730f9c5123255a314b93db0a99e6d
-
SSDEEP
3072:AUUEa9Te3JQBf8td3/oxN1ULH0ty58e8h4:D7QRyi1ty5
Malware Config
Extracted
redline
mucha
83.97.73.131:19071
-
auth_value
5d76e123341992ecf110010eb89456f0
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1660-123-0x00000000003A0000-0x00000000003D0000-memory.dmp
Files
-
1660-123-0x00000000003A0000-0x00000000003D0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ