Behavioral task
behavioral1
Sample
19161220x00000000003C0000.exe
Resource
win7-20230703-en
General
-
Target
19161220x00000000003C0000.dmp
-
Size
192KB
-
MD5
226a7be6ae21d3185793ef7bf6e78e17
-
SHA1
4379b6201178f6581e5dd06efcb77056373fc14a
-
SHA256
d7a6c42540bc3eadae5df37d2f1bb1fc4559fe455e1439f8bfdaa535cd301441
-
SHA512
72e105899e35d587666c4b7ee2bf0f4b654f6b18e10fd6a46b36a954ec817771f450fde278e3ea1e5ea34cfe67e86210d437692e9cd9d507d8190fe8fe581b9f
-
SSDEEP
3072:PO64zyFlJDGx0HqSYxNXUfMim4G3L8e8hE:Xf1s0HZ8em4G3L
Malware Config
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19161220x00000000003C0000.dmp
Files
-
19161220x00000000003C0000.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ