Behavioral task
behavioral1
Sample
c039e5f7304a2f1fd45e0fe80eefcc90_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c039e5f7304a2f1fd45e0fe80eefcc90_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
c039e5f7304a2f1fd45e0fe80eefcc90_JC.exe
-
Size
175KB
-
MD5
c039e5f7304a2f1fd45e0fe80eefcc90
-
SHA1
13c031d28cb4576ccd7517cd1bfc2e7ae1236d0d
-
SHA256
4994cc9a388c4f17ca1718324a3f52aab3d298a9214cd8d7858eff7f7c043e91
-
SHA512
d061b2bf4a964f3a0c1599e2027991854e2cbb2d7d85a4074fd90a57c09a14bc4f8b8dfdd9c452227628adca85d39fe9b3c92b480449681f9a52c3dd90e7f6eb
-
SSDEEP
3072:KiZIEVII0FNuHZOJpFLizeIkqffffffffffffffffffffffvfffffffffffffffm:KiVII0FNuHYIpffffffffffffffffff3
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c039e5f7304a2f1fd45e0fe80eefcc90_JC.exe
Files
-
c039e5f7304a2f1fd45e0fe80eefcc90_JC.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ