Behavioral task
behavioral1
Sample
972-126-0x0000000004ED0000-0x0000000004F10000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
972-126-0x0000000004ED0000-0x0000000004F10000-memory.dll
Resource
win10v2004-20231215-en
General
-
Target
972-126-0x0000000004ED0000-0x0000000004F10000-memory.dmp
-
Size
256KB
-
MD5
9bdf94cb8906e95ba54a18276274bdd2
-
SHA1
7ac7060fed6e828dae5681cce87732d70b50748c
-
SHA256
d20b054e727272dc128a6ad116148147ccf8c8b0a2c18cc5832466ec9b72297a
-
SHA512
ce0290372d5c2e147b668ffe20691156ba373ccd9ab56b80143ca7da9910a01e7db75d87ddcd3058160b8790db511eb76d16f6bd850d972d549c642ee699532f
-
SSDEEP
3072:58e8hh2zVCBh+DRzJM2xN5U9kK8Aw8e8hh:5pxCCyIq8Aw
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 972-126-0x0000000004ED0000-0x0000000004F10000-memory.dmp
Files
-
972-126-0x0000000004ED0000-0x0000000004F10000-memory.dmp.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ