Behavioral task
behavioral1
Sample
6068-511-0x00000000009C0000-0x00000000009FE000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6068-511-0x00000000009C0000-0x00000000009FE000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
6068-511-0x00000000009C0000-0x00000000009FE000-memory.dmp
-
Size
248KB
-
MD5
07fd1c9f5b66ee3c2f80a1b6efc16e89
-
SHA1
4062ffc915b40b0c26d582f595266ccb00ecefdf
-
SHA256
50fb54797d0b87fa6c12026b2aeb6f9a0df99f26bb83887b7c588d6794d08b1b
-
SHA512
9140d0335f56d0e09ef7c886fe9e122b9261e65184db6f7a5b4914514b71ce8a4e83a750ca8198942c4aaf1d6b878fc5bcf2e82cad1a02581f117a1ad12efa31
-
SSDEEP
3072:BJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRY:PDPGv1NgcUVWCuHF/CXPMxXLEfc
Malware Config
Extracted
redline
@ytlogsbot
176.123.4.46:33783
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6068-511-0x00000000009C0000-0x00000000009FE000-memory.dmp
Files
-
6068-511-0x00000000009C0000-0x00000000009FE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ