Behavioral task
behavioral1
Sample
860-7-0x0000000000400000-0x0000000000460000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
860-7-0x0000000000400000-0x0000000000460000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
860-7-0x0000000000400000-0x0000000000460000-memory.dmp
-
Size
384KB
-
MD5
b6316c3441c1f0f280be46a3b9361560
-
SHA1
fe6b25037525e57feb52da54dcb6fe696b5442de
-
SHA256
8d98c7cc227dc9daffef81eeb50abe794e24114fbaec277dbb3617bceff5f4f3
-
SHA512
cc31fe10c41caa0f01a60c40aef8814d3837920e58f71cc2ae6109fefcf57ddf8a556c1414c6f4331015ba1a2b8b8dd08d6d7cba36ac30d7308d67bb2a698c17
-
SSDEEP
6144:Ln8rmeRBVZsg4YshKNgc0zozfymk/u/ffB9dypJuw:j8KGBVZ54tKNgc0zNmk/ugpJj
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 860-7-0x0000000000400000-0x0000000000460000-memory.dmp
Files
-
860-7-0x0000000000400000-0x0000000000460000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 227KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE