Behavioral task
behavioral1
Sample
1636-97-0x0000000000340000-0x0000000000370000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1636-97-0x0000000000340000-0x0000000000370000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1636-97-0x0000000000340000-0x0000000000370000-memory.dmp
-
Size
192KB
-
MD5
455eeda758b0a52864d92ca95b6af57a
-
SHA1
85fd0d923eadc6ff6926dc4d7beb205aa201816e
-
SHA256
de4f821ef749c092ea6cf6ab0423237fce9b3527ed391b910359fa1974a00694
-
SHA512
0866ce5805f0aa39f52d107b4e83a400e0112b6f74b63946b6dc3015b461706c9d0c97286784a7e4dc66756d43134b6a4af7fea922d3e305dccfea7e037eb94f
-
SSDEEP
3072:eAWi/g1IzuRb5xNAKY73zOyuj++0E8e8hk:ezi/+VCHuyuj++0E
Malware Config
Extracted
redline
nowa
77.91.124.49:19073
-
auth_value
6bc6b0617aa32bcd971aef4a2cf49647
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1636-97-0x0000000000340000-0x0000000000370000-memory.dmp
Files
-
1636-97-0x0000000000340000-0x0000000000370000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ