Behavioral task
behavioral1
Sample
1332-79-0x0000000000400000-0x0000000000446000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1332-79-0x0000000000400000-0x0000000000446000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1332-79-0x0000000000400000-0x0000000000446000-memory.dmp
-
Size
280KB
-
MD5
157125819d650d6108d2551611901c7f
-
SHA1
c114286c0fdc98a552d8bd4f6565449850f847b8
-
SHA256
df8c51adacaad0d8ff261933e374e1625821a40242dbbca1eef283f9c0ab8882
-
SHA512
b1636ef7cce38c4cab8f015d4eae977942f4c8c830cdcadb6698f847ef7c6e4e9cbec6e4ea2f3fbab7173c83699dfe499ff9b3507e255017aaa4a7e2e06e5d48
-
SSDEEP
1536:9dLBmgrojz6evod3RYUOzdc7Mzhv8LsbV7/95PewyXa:XUsojgYxdc7MzhvtNb8q
Malware Config
Extracted
redline
whitedoc
81.161.229.143:45156
-
auth_value
2020d22aaa2ecafa1b12e00dfcffae03
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1332-79-0x0000000000400000-0x0000000000446000-memory.dmp
Files
-
1332-79-0x0000000000400000-0x0000000000446000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ