Behavioral task
behavioral1
Sample
2660-960-0x0000000000C60000-0x0000000000C9E000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2660-960-0x0000000000C60000-0x0000000000C9E000-memory.exe
Resource
win10v2004-20231025-en
General
-
Target
2660-960-0x0000000000C60000-0x0000000000C9E000-memory.dmp
-
Size
248KB
-
MD5
284ff02d0cfec030640bdb5fb4c59f22
-
SHA1
4f4b58f8ec64547f60a4bef1b8bc57e4f62b8138
-
SHA256
a8bfff16abcffc5de15d7f66a807409f77db804df040e4d8e57384806cc382bd
-
SHA512
07208fcb1a3731b2fb1620a968506e06578fa684b5e6407ec0e08dd32d2b04192438625abb187ee040a7ca1f72f23cc8808ceced9679f4fcd3b20e5b98e64f15
-
SSDEEP
6144:MmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:7HQNgcPf1JROBNFygk5
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2660-960-0x0000000000C60000-0x0000000000C9E000-memory.dmp
Files
-
2660-960-0x0000000000C60000-0x0000000000C9E000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ