Behavioral task
behavioral1
Sample
8804-1440-0x00000000001C0000-0x00000000001FE000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8804-1440-0x00000000001C0000-0x00000000001FE000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
8804-1440-0x00000000001C0000-0x00000000001FE000-memory.dmp
-
Size
248KB
-
MD5
7bf7f92f8e4461d55b37b842410deac8
-
SHA1
e85f8fe0dc6f39c35bc51c8268c4e474016f5234
-
SHA256
bc8bc7916d0da45186d572fdf416ac7ba7b2203e63ac9379d0f79ee7bae68a03
-
SHA512
10e72700b145d6c61cadac537447e956d174ba0d3369fc0ffd0ee8ca326e2ff477f2dda811932740e06bd0f5ecfbae05fc997e832f7977230874f9596d387153
-
SSDEEP
3072:NHng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzv:xg/XNgcWr3aPu/5FlvDYLpqt
Malware Config
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8804-1440-0x00000000001C0000-0x00000000001FE000-memory.dmp
Files
-
8804-1440-0x00000000001C0000-0x00000000001FE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ