Behavioral task
behavioral1
Sample
1464-328-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1464-328-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1464-328-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
7d2929fb8e7f1a4cf95e8cd4f2e0c85b
-
SHA1
36b9ae95781149d071db7fc165872a4920f91de7
-
SHA256
58fb0ecc87d736ced87a5b28f417787001532d3513f42cb84227465e73133031
-
SHA512
41a736733a47673324762455f77119615c089f9dfe7e48471cdf50cef0cd0f0d9641ebc46e57a57c1f5337909791777c36255c309f1b0d230cc8ddc2a90be734
-
SSDEEP
1536:GaQcnVHT1H/ofs2J88+f5wSL09Fu/O8mtBhZjaGbV7z/T9m2sYgibfbFDKsRv:jQcZZjCKmSL+uXm90S1LSYgafJlv
Malware Config
Extracted
redline
240623_rcn_11
rcn.tuktuk.ug:11285
-
auth_value
c3b2a1ea22f94130d13c3d3e2ab4dedf
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1464-328-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
1464-328-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ