Behavioral task
behavioral1
Sample
5504-317-0x0000000004960000-0x0000000004990000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5504-317-0x0000000004960000-0x0000000004990000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
5504-317-0x0000000004960000-0x0000000004990000-memory.dmp
-
Size
192KB
-
MD5
18c35c17b77d8f5dc5f081415a5144cb
-
SHA1
99ee7cf5f1ae5a529fc91f6174df9327fa01f8fd
-
SHA256
3ca27525cb7c7e5673e2fd542d48384448ff8749e84b38c4b00cb78573b9b6e6
-
SHA512
dce1b8eedb83d564890f3c17b2ae4b237a642e0aca873539def45a5c676f93ed731b2ec1ec67942c4efb56d11416fb257cd3c87da02e4854a4f357a9c7b3bc55
-
SSDEEP
3072:WORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJC8e8he:CSp3I0SbF/OVESYoqE0XmFueE
Malware Config
Extracted
redline
YT LOGS CLOUD
176.123.4.46:33783
-
auth_value
f423cd8452a39820862c1ea501db4ccf
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5504-317-0x0000000004960000-0x0000000004990000-memory.dmp
Files
-
5504-317-0x0000000004960000-0x0000000004990000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ