Behavioral task
behavioral1
Sample
836-97-0x0000000000250000-0x0000000000280000-memory.exe
Resource
win7-20240220-en
General
-
Target
836-97-0x0000000000250000-0x0000000000280000-memory.dmp
-
Size
192KB
-
MD5
e9ffa1936c2fe8c6e208428bd7b6cd4d
-
SHA1
eb2cb28bf75a398bcf46d249e3e42e12d995cad6
-
SHA256
18f7892360466122c471f0f76036fa7e7c48a26cee6ab0599cb4fce45c79bed4
-
SHA512
33fde09468c7d395febec6a210e1a7b7449176fed058dd00e5e632f9e4c3d7a8ba0534e871194d65bed41433ad2ec2e9cd73f88da0d14ba2c10461844bb3b2f1
-
SSDEEP
3072:x47FCYO0NJQ5S0xNcIA7qVJeNGU8e8hy:xvd0AEnCVJeNGU
Malware Config
Extracted
redline
drake
83.97.73.131:19071
-
auth_value
74ce6ffe4025a2e4027fb727915e7d7c
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 836-97-0x0000000000250000-0x0000000000280000-memory.dmp
Files
-
836-97-0x0000000000250000-0x0000000000280000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ