Behavioral task
behavioral1
Sample
1072-61-0x00000000003D0000-0x0000000000404000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1072-61-0x00000000003D0000-0x0000000000404000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1072-61-0x00000000003D0000-0x0000000000404000-memory.dmp
-
Size
208KB
-
MD5
85d212e3a3542fca8904625705a7902f
-
SHA1
e51735d58e27b9625a027b75e5652766561a2412
-
SHA256
02d83ee4c4060ca9f00731376cd868d3f89a3f9ea602ce3cf6987ff87426d38e
-
SHA512
40e49b81d319f3215f913b604e88851208ef4e6db5d3444546bc96afb82dc1614a10343b148df34378186eea2498e85d722889b674925944e950d8e10f87f267
-
SSDEEP
3072:Zacs69mY3tmFiIEcO2BbyFwQAUOqtEm/CqQv9COCoKvlc4FIz1YF54+YEzPd8e85:wcs6TtmFww1F1YF5dBo
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
149.202.8.114:26642
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1072-61-0x00000000003D0000-0x0000000000404000-memory.dmp
Files
-
1072-61-0x00000000003D0000-0x0000000000404000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ