Behavioral task
behavioral1
Sample
2020-273-0x00000000004C0000-0x00000000004F0000-memory.exe
Resource
win7-20230621-en
General
-
Target
2020-273-0x00000000004C0000-0x00000000004F0000-memory.dmp
-
Size
192KB
-
MD5
9dd267d7e37eb1968796ac37b84ba783
-
SHA1
073ba41eebeef371a9b9e97d21ecebd08e9adf39
-
SHA256
c0375b9166af861840319188958c0805528966180c391e7a788038a6d66d6e40
-
SHA512
b198b72d64d34e8ab0881ae75d4df5676d2922a074887e7a9c9f55564a7750974ee2f1573c9320eb23d6d4f97e4761da49177f32e11ae6197a6d5f520ccb6749
-
SSDEEP
1536:chbEey6y36sv0W7TDGOIrHuyk7xk2W5/uGxNFVYQffbuclGHQ4N0GkRT8e8h3:clEebE6Cyk9i5/uGxNMS3azNA8e8h3
Malware Config
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2020-273-0x00000000004C0000-0x00000000004F0000-memory.dmp
Files
-
2020-273-0x00000000004C0000-0x00000000004F0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ