Behavioral task
behavioral1
Sample
1088-10-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1088-10-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1088-10-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
039bf9427a2099844146a82bf972d2bb
-
SHA1
1f0ced8509768e933f6cfcd1341104cd94a40824
-
SHA256
900acf99d73cf7b5b425997edea23ab061113210021cd0b8af22de8566466821
-
SHA512
9297a1ea7ccc7fd913386db94e3f37e2b7fa60949efc5ef2a4e6ef4a1a48e577edc7fafc97bd2088ed92f32b27e8f98237e3198dc9af1cfe18da460c5d048c2f
-
SSDEEP
3072:4824Ql3ZZjSC5hh/hPh3qVi7oEnmhDc8e8hE:z2R9ZZj/3VnmhDc
Malware Config
Extracted
redline
45.15.157.131:36457
-
auth_value
23ec31ec68a10e3994c0c1bf22edf7da
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1088-10-0x0000000000400000-0x000000000042E000-memory.dmp
Files
-
1088-10-0x0000000000400000-0x000000000042E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ