Behavioral task
behavioral1
Sample
2968-222-0x0000000000400000-0x0000000000461000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2968-222-0x0000000000400000-0x0000000000461000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2968-222-0x0000000000400000-0x0000000000461000-memory.dmp
-
Size
388KB
-
MD5
21edb476a0dedc6df8a494ac484a7291
-
SHA1
499db6d7515a20154e99273065beb554cb9fb85c
-
SHA256
6b9da6ef4d63b1804c1bf943d702e59e1b7af608c4f6c196ac10eac1d8600481
-
SHA512
40ffd693c89e4cb76613ca502929b72cdcf45fc97069436a607475c45dac06ce8950242144a42dad285bfca573a455a582aeb77d5300a2f013e1b867155a3800
-
SSDEEP
6144:FBItoKp6/wQmwTg/XNgcWr3aPu/5FlvDYLpqtVd:FKton/tmwTCXNgcWrD31AqtP
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2968-222-0x0000000000400000-0x0000000000461000-memory.dmp
Files
-
2968-222-0x0000000000400000-0x0000000000461000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rqvas Size: 2KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE