Behavioral task
behavioral1
Sample
2800-264-0x0000000000100000-0x000000000013E000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2800-264-0x0000000000100000-0x000000000013E000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
2800-264-0x0000000000100000-0x000000000013E000-memory.dmp
-
Size
248KB
-
MD5
e8068f689f98ec21b5af0669e804d525
-
SHA1
2494ffed6e689f715ec2b829613939f6244d5af6
-
SHA256
f2860415ab3a0427a95b42ad08a5dc26e87ca0e1be2ea29a63085ab5185d302f
-
SHA512
43912f7800a7d8a459ec06c3f667e4afa936dbe69ed5e146977b7c2531d6b983e406342ee67a0eed31979c9a30604128677de8105e12c6271622ef247829f54a
-
SSDEEP
3072:RVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLK:DyymJYNgctwLU21/Rb2/fY9O
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2800-264-0x0000000000100000-0x000000000013E000-memory.dmp
Files
-
2800-264-0x0000000000100000-0x000000000013E000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ