Behavioral task
behavioral1
Sample
21721220x0000000000320000.exe
Resource
win7-20230703-en
General
-
Target
21721220x0000000000320000.dmp
-
Size
192KB
-
MD5
4aace3acef4c2ac61b4934344e56c104
-
SHA1
4606fed739eecc5c35ed3c7a2880c3ecfa7868bf
-
SHA256
64ed0cbaa4b922b8eb4f53024a1615ebba36dd2e7fc849e41428dcabbb541e81
-
SHA512
fa5cc6da256b7a07c2289e9f4471e86a823634e485b04197c591761393eb6b06adda23802be8d8595452c5ad214c11b64f6cd6bc6b853094e81d1ebdd6c00c37
-
SSDEEP
3072:0O64zyFlJDGx0HqSYxNXUfMim4G318e8hE:Af1s0HZ8em4G31
Malware Config
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21721220x0000000000320000.dmp
Files
-
21721220x0000000000320000.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ