Behavioral task
behavioral1
Sample
2056-122-0x0000000000290000-0x00000000002C0000-memory.exe
Resource
win7-20230705-en
General
-
Target
2056-122-0x0000000000290000-0x00000000002C0000-memory.dmp
-
Size
192KB
-
MD5
81c2095eb28d9fcccad9b98771ff5ad7
-
SHA1
3e4b645cf2bdae66c0f465c949cb4d3ed6f9072d
-
SHA256
793e39253a68ed46a7216cbfe40d0c04309365fbe1c4e565f8aaf857ce4d4a33
-
SHA512
5ff8a2f417045c2c31b5e132dd793c0131921e31e942a029ef2496d0e478f9918f1fa4b3dd2fc8ee2c3f1c3190d17ff5302f60f664b928ddd333a629c659bdbe
-
SSDEEP
3072:EO64zyFlJDGx0HqSYxNXUfMim4G388e8hE:wf1s0HZ8em4G38
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2056-122-0x0000000000290000-0x00000000002C0000-memory.dmp
Files
-
2056-122-0x0000000000290000-0x00000000002C0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ