Behavioral task
behavioral1
Sample
2124-3-0x0000000001170000-0x0000000002A80000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2124-3-0x0000000001170000-0x0000000002A80000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2124-3-0x0000000001170000-0x0000000002A80000-memory.dmp
-
Size
893KB
-
MD5
3cbe5ead916d484477df5d2eb8a74a67
-
SHA1
2a647bcc596339695766c7da5a5b6a273c0cf748
-
SHA256
611ef634270f754dc006defc3154d876fbb8d59401762fab2dcb79d449f91513
-
SHA512
1d3cfa338ff76159ffa42f74aa7fc45007da8df65be086e61caac1d35d43c0573ad05d6458ae15ed407642b4224396bf19e253364859b5347563d066f245413d
-
SSDEEP
12288:V1bWFMsW8eKPRlW/AaG85VX23TvNqNNvsk+xonnDzc:rfsZlW/A6XqDoNqXxo/c
Malware Config
Extracted
redline
1w1
135.181.242.178:42473
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2124-3-0x0000000001170000-0x0000000002A80000-memory.dmp
Files
-
2124-3-0x0000000001170000-0x0000000002A80000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 19.6MB - Virtual size: 19.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ