Behavioral task
behavioral1
Sample
660-347-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
660-347-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
660-347-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
843e45e91361da29de1c5e5b6171e3c2
-
SHA1
ae563157516c918e8e7f1da2024c4fd2f946b2db
-
SHA256
993d2d0f7d319e672bff1c556f9d0bdcc10d9a7cfdc9d8e8606f99c978028435
-
SHA512
49231c92c816a4a26a8a4a0a8e99e285cfbc00fff042564afbdb444bb1d587cc3765daa1eeb61402097f0cbf0e9a0930a9743764256daf09821542610c8e0163
-
SSDEEP
3072:QTrv7Zn47I0TCcc0O95bb2uME0eCbbX9Xp9buoJ:WvS7I0TCccUuME0J9Xp9bD
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
149.202.0.242:31728
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 660-347-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
660-347-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ