Behavioral task
behavioral1
Sample
784-6582-0x0000000000940000-0x0000000000970000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
784-6582-0x0000000000940000-0x0000000000970000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
784-6582-0x0000000000940000-0x0000000000970000-memory.dmp
-
Size
192KB
-
MD5
500247325a88a587761e2609953a6714
-
SHA1
8adf3827666dd41cfd03fed483de9f040c82ff28
-
SHA256
1b0bdc26b449b13143dd1582991940ba1cda8bebaa659e171d27b557acf70edb
-
SHA512
3f6f919e2db51e6d63d83e8858f5ffb7c3a6d9a716560caae5867d3fc981b65d26af83f82ea91bcad648edffc3da187f8340d5767de33d91dbc149319255cd0e
-
SSDEEP
1536:gR1B8iqlVZRGWcAL4rMeV0HB3PE3+GnTGqVkbutpPljdzXgPw83wYkl8e8hp:4n8U0Z/EOVqV8OVdzXgPw38e8hp
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 784-6582-0x0000000000940000-0x0000000000970000-memory.dmp
Files
-
784-6582-0x0000000000940000-0x0000000000970000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ