Behavioral task
behavioral1
Sample
1944-97-0x00000000003B0000-0x00000000003E0000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1944-97-0x00000000003B0000-0x00000000003E0000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
1944-97-0x00000000003B0000-0x00000000003E0000-memory.dmp
-
Size
192KB
-
MD5
d53648140f37c44077d780526d72c835
-
SHA1
7ab35cf93fe9265d685caed11b4c469ffe2a80e3
-
SHA256
ebb93fd09ba054168d0313c8161f25e78ddc1d42c6356158927cb9c1966ce5e0
-
SHA512
69e7e020e3c2854e33de2e50c376e4224258712cb55b4e4c98880aa2dddac884624d81880d9fa4beb449a33d4ec00382fb00fc8b30192bc1217a64b9a2023a95
-
SSDEEP
3072:0tE62xyQ6d+VeXdxNLgVK880EHC8e8hK:MEmOA9S80EHC
Malware Config
Extracted
redline
andre
77.91.124.49:19073
-
auth_value
8e5522dc6bdb7e288797bc46c2687b12
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1944-97-0x00000000003B0000-0x00000000003E0000-memory.dmp
Files
-
1944-97-0x00000000003B0000-0x00000000003E0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ