Behavioral task
behavioral1
Sample
1344-54-0x0000000000220000-0x0000000000250000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1344-54-0x0000000000220000-0x0000000000250000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1344-54-0x0000000000220000-0x0000000000250000-memory.dmp
-
Size
192KB
-
MD5
61d901e4f8050991b25f7fb577f6ac75
-
SHA1
745ccbc10f64a0f8f812b84b859de1b852614226
-
SHA256
41de8eff53b80776a4c5f05fec63b095543709b86c8372709d858f2a7cdc8102
-
SHA512
a2559e67f553bbc46554935c88b47aa850ddf658317e56eb7c53483933202223956acd088a80b4eff0d7300ea3b33da204a894b39bf54c17801480188b735bae
-
SSDEEP
3072:77FcUMo+9XJIZYExNjGof40fz458e8hE:nFzoZLs3jz45
Malware Config
Extracted
redline
furga
83.97.73.128:19071
-
auth_value
1b7af6db7a79a3475798fcf494818be7
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1344-54-0x0000000000220000-0x0000000000250000-memory.dmp
Files
-
1344-54-0x0000000000220000-0x0000000000250000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ