Behavioral task
behavioral1
Sample
10361220x0000000000360000.exe
Resource
win7-20230703-en
General
-
Target
10361220x0000000000360000.dmp
-
Size
192KB
-
MD5
b331302f11c741ec9a9004850335f46c
-
SHA1
dcc0f8331c5b4faa48cfbf71fcfb5d51a3baf606
-
SHA256
e080a19bd27f696f9c3e75e772943a1a9aa59a8c148ee53b2bfaaa195fc82eb1
-
SHA512
59e7ef872ba2105bf238aa1412b8bfb34d409ef6564c11bebea8ad237fe60c3c1be2e7af2da2848f22272b1e0d1d59b18e4d433dd6631b111e541b5b540b7faf
-
SSDEEP
3072:OO64zyFlJDGx0HqSYxNXUfMim4G358e8hE:if1s0HZ8em4G35
Malware Config
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10361220x0000000000360000.dmp
Files
-
10361220x0000000000360000.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ