Behavioral task
behavioral1
Sample
8072-657-0x0000000000400000-0x0000000000449000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8072-657-0x0000000000400000-0x0000000000449000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
8072-657-0x0000000000400000-0x0000000000449000-memory.dmp
-
Size
292KB
-
MD5
fe65bcb6abfd2496e4933436b840e15d
-
SHA1
367e2f6e9f88c069f19dff20a8aa9d5c90165ec6
-
SHA256
9f0542578e334e11d996cfda9dd2e5b4f9a31c9d36f892585218c785dda9ee8f
-
SHA512
07157471a7eb3634cbca307deb7b112834a842df96aa5f2fb65f92f216449351592a5cb40690d41b9b025b8ae29023548d3dcf5667ab3f831f3e2ef202ae6726
-
SSDEEP
3072:575r/6YQrcAyng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzrd:57N/6yg/XNgcWr3aPu/5FlvDYLpqtV
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8072-657-0x0000000000400000-0x0000000000449000-memory.dmp
Files
-
8072-657-0x0000000000400000-0x0000000000449000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 225KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE