Behavioral task
behavioral1
Sample
1656-309-0x0000000000400000-0x000000000043E000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1656-309-0x0000000000400000-0x000000000043E000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1656-309-0x0000000000400000-0x000000000043E000-memory.dmp
-
Size
248KB
-
MD5
35f30c470c910d94eff1fed838a7ce4c
-
SHA1
dd91d01f9a32a141fe2991dba544590d4cd0ae3a
-
SHA256
cfa85460a904d4a830a22b8f174717607239823a9d09fadedf5d11c86d859d69
-
SHA512
37a44fa17a5139346ae81d42cb7ff17d69c2aae4154aa099d79c295f396cdadb6fc2fba81f79e3a20bc50b74afacebcee64f7e4d6a79e78819710d210968a910
-
SSDEEP
3072:2VXnPpnCniNgcpzE22NX2eSYht/qRuZ5EhBzEUlED6L:+XPpCiNgcpI9NXPj/hZ5E/oUlED
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.255.152.132:36011
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1656-309-0x0000000000400000-0x000000000043E000-memory.dmp
Files
-
1656-309-0x0000000000400000-0x000000000043E000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ