Behavioral task
behavioral1
Sample
1688-62-0x0000000000A30000-0x0000000000A60000-memory.exe
Resource
win7-20230712-en
General
-
Target
1688-62-0x0000000000A30000-0x0000000000A60000-memory.dmp
-
Size
192KB
-
MD5
aaf971c9ac99a442c62fa572dae0aab8
-
SHA1
3636ec40e824307a97be59799a34ac8251eaba50
-
SHA256
d0ded04d08c1b52bf3fce2641575d795286f65c9472d03e3805f3f65b9caa542
-
SHA512
419c4608a67dccf03a079baa205bb8fcb92daf9001dc7a2af0503abab0086722c3a8efd20bfa6e49213191e375247840326f82eafc27d836a81b10c4db888119
-
SSDEEP
3072:O+fDbCPvc9r+ghxNzIoIH50m7Qh0Q8e8hC:OhBgxSfQh0Q
Malware Config
Extracted
redline
x-101zz
94.131.112.27:80
-
auth_value
55d38112b069e981e131a99cb4689f21
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1688-62-0x0000000000A30000-0x0000000000A60000-memory.dmp
Files
-
1688-62-0x0000000000A30000-0x0000000000A60000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ