Behavioral task
behavioral1
Sample
2016-32-0x0000000000020000-0x000000000003E000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2016-32-0x0000000000020000-0x000000000003E000-memory.exe
Resource
win10v2004-20231222-en
General
-
Target
2016-32-0x0000000000020000-0x000000000003E000-memory.dmp
-
Size
120KB
-
MD5
27607011683fbba528bb66c6d2b95f61
-
SHA1
de2f9bbaaeb7b7907cd578fea7a498373120a274
-
SHA256
10035d3d311c3246e4d81c9924de5fc77327f85ae4aecdff44939b3db4a370bd
-
SHA512
c0aa70a79d77c4ccddac6902edc4524dcf3a1e000c72223af7e36a35fb9a74a9d801dbdedf038a42e92ef9b9035de5d2f46002326397778a0e053ffe198d27d4
-
SSDEEP
3072:EvAEjhPm4tmrEDUdzFkDSuOkZDcXiqEqVLS:EWnKDRAX/
Malware Config
Extracted
redline
6077866846
https://pastebin.com/raw/NgsUAPya
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2016-32-0x0000000000020000-0x000000000003E000-memory.dmp
Files
-
2016-32-0x0000000000020000-0x000000000003E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ