Behavioral task
behavioral1
Sample
4608-6-0x0000000000B00000-0x0000000000B52000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4608-6-0x0000000000B00000-0x0000000000B52000-memory.exe
Resource
win10v2004-20231222-en
General
-
Target
4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp
-
Size
328KB
-
MD5
943033c3a7f1ddc16795befbd8273cd4
-
SHA1
f9401a48eb6c27bab89b49c77ad74894c0e7b82b
-
SHA256
0a4e248847be373da7f6d9a288f8728b0fc0317a1099e0762e0278f59db0b303
-
SHA512
470dfbde37993a6b9b87a2a0c519620ed20570123fb16d16da5fe46114ba7453c6946a1ef94d671e63f0afc457b894b5aea49a2ebe808239aa64d1d11adc4266
-
SSDEEP
3072:wcsqexnfF9k4fr+XwMK2sbAOIUdGHl8JH3QqY3nPrveWrNxk0QcadS2gMRqTjDv+:rdMdk2ktxkFcaAXMRqTjD4EL
Malware Config
Extracted
redline
@ytlogsbot
185.172.128.33:38294
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp
Files
-
4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ