Behavioral task
behavioral1
Sample
1660-339-0x0000000000AC0000-0x0000000000BDB000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1660-339-0x0000000000AC0000-0x0000000000BDB000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
1660-339-0x0000000000AC0000-0x0000000000BDB000-memory.dmp
-
Size
1.1MB
-
MD5
1077cc808fec1cdc4812e32aabd43b44
-
SHA1
d319a6c7af9c7e9d3a69d27bbd31cb63f032556f
-
SHA256
7e08175209b0595b99abe0121ce1e480e853098b74213cb3767ad528fcf60cea
-
SHA512
89d87f9a88d8901ce17fc60addccc41aed7eb09d70061671c248e2c88ed629b077c97a1a9dd43983e1c300170153d9d3bfd063b3af6e35b9479bef4e753f17fd
-
SSDEEP
24576:1ZR9iBk0t4rhGyjCHMhuXuioOvhtQzbNgcZwDybSsMSq:1Zl0t4rhtjMMoz5NitH
Malware Config
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1660-339-0x0000000000AC0000-0x0000000000BDB000-memory.dmp
Files
-
1660-339-0x0000000000AC0000-0x0000000000BDB000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 674KB - Virtual size: 674KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PUMP Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ