Behavioral task
behavioral1
Sample
2648-160-0x0000000000310000-0x0000000000340000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2648-160-0x0000000000310000-0x0000000000340000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2648-160-0x0000000000310000-0x0000000000340000-memory.dmp
-
Size
192KB
-
MD5
2b710806ab5dd30938d4f8e6936e5594
-
SHA1
0e0b6da431383085a4825c1ced80f3f65343f38b
-
SHA256
ddab253ffbd5ce59432cefe9525d7d9e5f4f83e112a90e84e26f16ac04cad205
-
SHA512
3dfbb8ba93561c8516eab1c520be22a5bf749a612939c54cea28d5240e6b6fb68098be55912513b59cbb3d930528c9e72a6f1363e04e577456fb5f9c44a44534
-
SSDEEP
3072:5IV6GXCa9azR4Y+D3u9xNmef3Gx/kufrqT8e8h0:5IV+4PesJx/kufrqT
Malware Config
Extracted
redline
5059662751
185.106.92.73:34437
-
auth_value
5a61990e75c94ef341ae930f2e5368d7
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2648-160-0x0000000000310000-0x0000000000340000-memory.dmp
Files
-
2648-160-0x0000000000310000-0x0000000000340000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ