Behavioral task
behavioral1
Sample
2064-247-0x0000000000590000-0x00000000005BE000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2064-247-0x0000000000590000-0x00000000005BE000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2064-247-0x0000000000590000-0x00000000005BE000-memory.dmp
-
Size
184KB
-
MD5
8d258bd05d9d6838aaebe3be397dac6a
-
SHA1
9a2d316486b1729019c538bf8ad59f49c09abe87
-
SHA256
826df26b97e1a62305ffd9f6f3920fa5159146d73d8333c8690ff35be77b531c
-
SHA512
31fe56a9fef1900b35a5192cd8d0369d2c42782ca72de52a30177ead536890237265c075ae54dc3b9904482a4c42e048927d0fdb30c6226a4c6ccc13a57edb0e
-
SSDEEP
1536:wW7YNKNqTqlVZRGW3vprDSMDMUs3GHc/0ilTGqVObufksWiYoTTx83wYkJ8e8hK:w3NKYyZSSK28/aqVawXYoTTxn8e8hK
Malware Config
Extracted
redline
test
77.91.85.137:81
-
auth_value
eb42c93b96eea8a95189cf1eeb4f7c0b
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2064-247-0x0000000000590000-0x00000000005BE000-memory.dmp
Files
-
2064-247-0x0000000000590000-0x00000000005BE000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ