Behavioral task
behavioral1
Sample
2800-71-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2800-71-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2800-71-0x0000000000400000-0x000000000042C000-memory.dmp
-
Size
176KB
-
MD5
12ecaf234ad9c1f492b22a448f76bd54
-
SHA1
3323f9a7436a54255562c2d7d120afe2120832fe
-
SHA256
e6f50aff49e5d3bc1ef0828650368d359eb19fd709002d0a6739e08f99335a7d
-
SHA512
9b0457106ae70bb2a5c9861f1de5161d812ab4d429ab4d16c2692fa81ec415b5a49cc63a3ba155586ff2fc160624de24e3d33c332aadd4cc880183f41eefad0a
-
SSDEEP
3072:E6Xm5kh9RxWFR+xN46J/3O6kL6kOj6QPy:Esh9CFCNkL6kOWQP
Malware Config
Extracted
redline
1
45.88.3.253:26313
-
auth_value
7280f9eb4f47693041f9f7d1fafe3acf
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2800-71-0x0000000000400000-0x000000000042C000-memory.dmp
Files
-
2800-71-0x0000000000400000-0x000000000042C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ