Behavioral task
behavioral1
Sample
836-112-0x0000000000330000-0x0000000000360000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
836-112-0x0000000000330000-0x0000000000360000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
836-112-0x0000000000330000-0x0000000000360000-memory.dmp
-
Size
192KB
-
MD5
3e7798df236f1ac57f4921d4390fb004
-
SHA1
3ea6ae7c0cc00f0344074da10fd2fbf532c051a5
-
SHA256
0c9a2221a940428c429630bac67fa140116d00e36a69c097366f31b804f26137
-
SHA512
4823094666e347985064c61327de8b48ae06dcbe7895a38bc9aff9a1e60b37ea99b8ee39b9771fb3cccf08e0f9bdfeddfb441489de5234a68872f1c1e27e13d7
-
SSDEEP
3072:aWmqQlNdSPCjoxN+4E7EOmVOH6m68e8hz:9mR9jd4OmVOH6m6
Malware Config
Extracted
redline
matiz
77.91.124.49:19073
-
auth_value
2d3267fe8e3910d278274f80e6a1cd2e
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 836-112-0x0000000000330000-0x0000000000360000-memory.dmp
Files
-
836-112-0x0000000000330000-0x0000000000360000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ