Behavioral task
behavioral1
Sample
4864-134-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4864-134-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
4864-134-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
d77ec3851936a64860cb9fbc89df08b6
-
SHA1
a057133b65f1189f798c9f4c565ed1a70480645d
-
SHA256
1528bed210724415da0daf09dc7a8dd75848975723ef63069c95d3d6c0bd4514
-
SHA512
9a9c581e34b30f9cc4b57aa976330ff3064009fd4113d00fee6ad7de930684fddf6d51b2d19dfd412523e0147391033b7f3d00293b1d2f2efda89006a3e3502d
-
SSDEEP
3072:qcLaERqzOK5NIITxN6K5D5kXkcP88e8h8:jacK5WIO0kXkcP8
Malware Config
Extracted
redline
inst
135.181.205.149:7724
-
auth_value
e4cc3acd78331714a123858fe2b1c234
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4864-134-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
4864-134-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ