Behavioral task
behavioral1
Sample
1756-54-0x00000000002D0000-0x0000000000300000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1756-54-0x00000000002D0000-0x0000000000300000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1756-54-0x00000000002D0000-0x0000000000300000-memory.dmp
-
Size
192KB
-
MD5
4f80009393038244c80cab793407098d
-
SHA1
a123b20544bbda118a41f776b6232b4ec6605c29
-
SHA256
b684d74114b3cd9b82b423e8cc8871379946e3fc910bbd72107a0207d0cdefd8
-
SHA512
6ef2af295e0ff837cd1f5c9e3adec55a99c77fbbf4a6d1d00b29b083f8d035c6c93ee4dbb9e5c4feaf2bf1e5393acbd6fc26d325983faa43bb283ed60fdb3035
-
SSDEEP
1536:ogKedNi036sv0W7TWKygyvHWlLRsBChShr1xNQlYQ/nbux+vlYroYl0GkRH8e8h4:oAIGPVd2CKr1xNHOVvWroYl08e8h4
Malware Config
Extracted
redline
1006
176.123.9.142:14845
-
auth_value
b5da80860b093905c2bba6f9377af704
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1756-54-0x00000000002D0000-0x0000000000300000-memory.dmp
Files
-
1756-54-0x00000000002D0000-0x0000000000300000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ