Behavioral task
behavioral1
Sample
5692-346-0x0000000000470000-0x00000000004AE000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
5692-346-0x0000000000470000-0x00000000004AE000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
5692-346-0x0000000000470000-0x00000000004AE000-memory.dmp
-
Size
248KB
-
MD5
381cc8f27d5a2d17ef0dbe9c53450576
-
SHA1
70b69995d23d6d0bddabc92d020c84dd0d8185ee
-
SHA256
16eecf493bed08a9627aa7446ac3469af6dbac5907499d5ca7a252f8814ce84d
-
SHA512
7d080b088b9bca98985f0695ace56a9aa01aaf6fd87b87a4a2b6e4bd8cd41e5802044c81d3fb1d777bf731949266d4170e89fc4bc0676b5e356c85dbbcff2150
-
SSDEEP
3072:NYng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzO:Eg/XNgcWr3aPu/5FlvDYLpqt
Malware Config
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5692-346-0x0000000000470000-0x00000000004AE000-memory.dmp
Files
-
5692-346-0x0000000000470000-0x00000000004AE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ