Behavioral task
behavioral1
Sample
1724-618-0x0000000000390000-0x00000000003CE000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1724-618-0x0000000000390000-0x00000000003CE000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
1724-618-0x0000000000390000-0x00000000003CE000-memory.dmp
-
Size
248KB
-
MD5
17e088d7311731a34bee58a38b0178e9
-
SHA1
b117216de4da2e9c305e168d091cea400f9ed499
-
SHA256
9461dff5f3bf0721dceb747eceda5dda11899ad3decc8052f984d3830bf91649
-
SHA512
0cbc1d4a04335af6ff0c82c354a2d30586e9378b83ee97820b60429998b2a7553dc260f777cf8445636b4bed7e20e761e7c06e2f26786b53ad818d23b9657c3d
-
SSDEEP
3072:pVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLN:ryymJYNgctwLU21/Rb2/fY9O
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1724-618-0x0000000000390000-0x00000000003CE000-memory.dmp
Files
-
1724-618-0x0000000000390000-0x00000000003CE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ