Behavioral task
behavioral1
Sample
3064-506-0x0000000000380000-0x00000000003BE000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
3064-506-0x0000000000380000-0x00000000003BE000-memory.exe
Resource
win10v2004-20231025-en
General
-
Target
3064-506-0x0000000000380000-0x00000000003BE000-memory.dmp
-
Size
248KB
-
MD5
4c577b5a6b7f38106aa4a9f50920e545
-
SHA1
dbad3dee70388371827c87e7a887bd4bc3ba605c
-
SHA256
80ff75a1e970b6e73a5af9b032799be63b48ddfa234b218f840e598b83bc3f20
-
SHA512
5ffe634b69e881261ee4cdb91ecbdfa0c822885c76ae9d93fc3e2b0c6dc1425820dd2ba556197915a72380ec46d88dc9c5f6593b1091666701ce36b210168c7b
-
SSDEEP
3072:JVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLy:LyymJYNgctwLU21/Rb2/fY9O
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.216.70.238:37515
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3064-506-0x0000000000380000-0x00000000003BE000-memory.dmp
Files
-
3064-506-0x0000000000380000-0x00000000003BE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ