Behavioral task
behavioral1
Sample
1008-112-0x0000000000340000-0x0000000000370000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1008-112-0x0000000000340000-0x0000000000370000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
1008-112-0x0000000000340000-0x0000000000370000-memory.dmp
-
Size
192KB
-
MD5
51effdee545b20161454c03402c5b305
-
SHA1
6b86ae5ff708d4319df1fb3e2c274031aee844af
-
SHA256
efbbaa65e1ef4a1ba861c59626c1db7e9f723c82d95f588ce8366e9bb2215211
-
SHA512
a3620231f95ade6fd214af56d91da90e358c6610127ea387f254449e2ed6350692a5ca4c82fe99113ddecde4037154da157557bf0f66dc25d3526f0dc47183a9
-
SSDEEP
3072:YWmqQlNdSPCjoxN+4E7EOmVOH6mr8e8hz:rmR9jd4OmVOH6mr
Malware Config
Extracted
redline
matiz
77.91.124.49:19073
-
auth_value
2d3267fe8e3910d278274f80e6a1cd2e
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1008-112-0x0000000000340000-0x0000000000370000-memory.dmp
Files
-
1008-112-0x0000000000340000-0x0000000000370000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ