Behavioral task
behavioral1
Sample
636-54-0x0000000000440000-0x0000000000470000-memory.exe
Resource
win7-20230703-en
General
-
Target
636-54-0x0000000000440000-0x0000000000470000-memory.dmp
-
Size
192KB
-
MD5
632f3a035e755b4452bfdd3c895d8508
-
SHA1
98a7c8c5cf1d8026d3646c8afb655c0343c63136
-
SHA256
1d7482f98254e871c864eb5f01453cc03eb83742ae3636717a2a47dddde3a325
-
SHA512
6445a356a5ba0b3edc26793b56a132557704010de75069c8eb06106e7e23d4a21c7a10879b5f8cf88176bdf44e2badff8cc54a2e6bc2a3fe9bb676c122be6bb9
-
SSDEEP
1536:FbuR0C10WqlVZRGWyuHrTog/XzMXMQ8ys88888888888888888888888g888888P:cR0feoog/ZpyqVEUCidWT8F18e8hQ
Malware Config
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 636-54-0x0000000000440000-0x0000000000470000-memory.dmp
Files
-
636-54-0x0000000000440000-0x0000000000470000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ