Behavioral task
behavioral1
Sample
2016-224-0x0000000000AA0000-0x0000000000ADE000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2016-224-0x0000000000AA0000-0x0000000000ADE000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2016-224-0x0000000000AA0000-0x0000000000ADE000-memory.dmp
-
Size
248KB
-
MD5
a50e30399369d9aebc48ecd0258fa1a2
-
SHA1
75b675217d43c2e2d4d788685ee4e47fe1e9f8e2
-
SHA256
57eef19c168661385db2072b617d8a4ef28c53ae3733d1914c84ca0d62b01edd
-
SHA512
b9a579b5a4ddbc99c8aca6f4901dffc510941cd95e5d906b771f144f004ee2d73206d49f8169edcef1f2f3d2a56fb8f5d29ddfe4c02998e217341ff74dad6f3a
-
SSDEEP
3072:ftJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAH:fJMeucNgckedxCDo/doQVZdZRzzXZQ
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2016-224-0x0000000000AA0000-0x0000000000ADE000-memory.dmp
Files
-
2016-224-0x0000000000AA0000-0x0000000000ADE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ