Behavioral task
behavioral1
Sample
4764-280-0x00000000001E0000-0x000000000021E000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4764-280-0x00000000001E0000-0x000000000021E000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
4764-280-0x00000000001E0000-0x000000000021E000-memory.dmp
-
Size
248KB
-
MD5
946b3604c26528ab1eb0ed6021ad4432
-
SHA1
27987754050037d1bdd3f5084ac63352d6afb09a
-
SHA256
346d739ef51c5e7ca7d549c634c345340d29be882f84e000a79e73543e67b5d6
-
SHA512
c571e04810c1737a347575790d57a507eac0aae0ca873075e906d7aa629296990eb75726ce09fe40e5425528f31d124ba80b8a514e528d7f751069080a4cadc7
-
SSDEEP
3072:KVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLa:qyymJYNgctwLU21/Rb2/fY9O
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4764-280-0x00000000001E0000-0x000000000021E000-memory.dmp
Files
-
4764-280-0x00000000001E0000-0x000000000021E000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ