Behavioral task
behavioral1
Sample
2372-1205-0x0000000000080000-0x00000000000BE000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2372-1205-0x0000000000080000-0x00000000000BE000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2372-1205-0x0000000000080000-0x00000000000BE000-memory.dmp
-
Size
248KB
-
MD5
3d594f774479899dcff32b65118de276
-
SHA1
fee6bad9bcabdad83da103adc93540b60c66798a
-
SHA256
f4101949fe2c56776f3b6eb3f2d03d1a7f53dd8c840e54813853e36b81b63069
-
SHA512
4f062a8cb94eda65aa61fe389035d217fc4beb497495bb2a417b63b1e24d32baba867af1f2865133e3cb1eb60b162226a7ad228c1adc0c3407b491d04ac53441
-
SSDEEP
3072:bEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:bGTWubNgcc+I1nRKlwTQ/PNbtS7Khma
Malware Config
Extracted
redline
@ytlogsbot
185.216.70.238:37515
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2372-1205-0x0000000000080000-0x00000000000BE000-memory.dmp
Files
-
2372-1205-0x0000000000080000-0x00000000000BE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ