Behavioral task
behavioral1
Sample
2040-4-0x0000000000400000-0x000000000044B000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2040-4-0x0000000000400000-0x000000000044B000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2040-4-0x0000000000400000-0x000000000044B000-memory.dmp
-
Size
300KB
-
MD5
28dba6db15db0182bf2f9d6cc80f0cd5
-
SHA1
2f191068ad009d5f15a6c04b9b1e280c1d4c5878
-
SHA256
4c1b6c13bdc1fdb0b5d59dc1dd6473475e71022051127aa4325e323c48c88860
-
SHA512
71293743a22ceb6ee46898f8e919bc2de71ade7e1bd0e000821e4c5cb68d3b7f57e66140a2254fd1aec57fd483af5a26fd8d256925ccdf54aa8b0329e09fc344
-
SSDEEP
6144:bks23ZspfuGJleENgcS1I1a2FS/Z7r0UMTDy:b82pt8ENgcS11J3MTDy
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2040-4-0x0000000000400000-0x000000000044B000-memory.dmp
Files
-
2040-4-0x0000000000400000-0x000000000044B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nyert Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 225KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qnnuy Size: 2KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE