Behavioral task
behavioral1
Sample
2604-652-0x0000000000D00000-0x0000000000D3E000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2604-652-0x0000000000D00000-0x0000000000D3E000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2604-652-0x0000000000D00000-0x0000000000D3E000-memory.dmp
-
Size
248KB
-
MD5
92c34dc99129eb9e2639f7e2bb47dd7e
-
SHA1
a3a0a11328a70c0dd9a7ce106e372341cb009f06
-
SHA256
504c371367d87ed8382bc44a5b59169d2e88693ccb311a3c4f87d80486b26a91
-
SHA512
00de00894260456bee1acfa777b93db945c9712a6a313ae244be1e894dd7dd1ba9b34da25ebb756e04f884793e7de3fa2988817c7243fd1fe509cd3d2ceeb686
-
SSDEEP
6144:ImSQQNgcPf2iHv0+9JR/xadbzBNFygk5:vHQNgcPf1JROBNFygk5
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2604-652-0x0000000000D00000-0x0000000000D3E000-memory.dmp
Files
-
2604-652-0x0000000000D00000-0x0000000000D3E000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ