Behavioral task
behavioral1
Sample
1936-257-0x0000000001170000-0x00000000011AE000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1936-257-0x0000000001170000-0x00000000011AE000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
1936-257-0x0000000001170000-0x00000000011AE000-memory.dmp
-
Size
248KB
-
MD5
5e39f86ae8ccdeee443fa506177abe29
-
SHA1
9cbef03100c25e7ab65e5826ca2b480e7caeed17
-
SHA256
a050a3f54e427633ab9bca325832883d62eeccfd45db30ef0f26dd461c813242
-
SHA512
2daf007b850e97b1348e4f95815f442b09be0303ed9f706e83c322f653f62121ed71a8207c32ff3fea3a2c552dd29435c91b70bba18a4fb2ea3eb9d38ce7739a
-
SSDEEP
3072:BVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLC:TyymJYNgctwLU21/Rb2/fY9O
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1936-257-0x0000000001170000-0x00000000011AE000-memory.dmp
Files
-
1936-257-0x0000000001170000-0x00000000011AE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ