Behavioral task
behavioral1
Sample
2020-57-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2020-57-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2020-57-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
0636bae51f61f6f41b20a4b97c05a766
-
SHA1
c97e2ab90ab19180d4c4727c737ae5ca5a136aa6
-
SHA256
6c76b5a03556da9c2d9079c959e9160aa5282e87e6806a39f9ca43d721e5d582
-
SHA512
e30bfb126729de790af760e4187752f31cd76b94101853bbdc4cc88fffe28b8929c514813c0c2dd2f26990f78f7b66ef3113b8880aeee7ac0cd2d6a69be3f913
-
SSDEEP
1536:HAHWvUqRV36sv0W7T+GP/rHQOav2HMpp6h/coJyykxNuZYQXjbuB+0NfiQLj6qeq:kYrD0OO62oJJJkxNBWXuKQLj6qe/
Malware Config
Extracted
redline
176.113.115.203:4390
-
auth_value
b73f21d8fec30b62995740e4608591e4
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2020-57-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
2020-57-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ