Behavioral task
behavioral1
Sample
1360-122-0x0000000000380000-0x00000000003B0000-memory.exe
Resource
win7-20240221-en
General
-
Target
1360-122-0x0000000000380000-0x00000000003B0000-memory.dmp
-
Size
192KB
-
MD5
4d558df4af1e911efe88d5ecc5559e33
-
SHA1
1f061eda34a75685103c7c09b78fbe31ad40daeb
-
SHA256
de6a2f8341901436b12e6a2051f84b6b8833aa4e117ae40a3a5fae1f18893bdc
-
SHA512
896d17bd724e0a6932a2dd444ee12befe70966000eab3d8e63fd0b7589e790e20963130cb4789b819c1382274cb085c4feb1172af0e35d6f363f3d080feb2530
-
SSDEEP
3072:PO64zyFlJDGx0HqSYxNXUfMim4G3H8e8hE:Xf1s0HZ8em4G3H
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1360-122-0x0000000000380000-0x00000000003B0000-memory.dmp
Files
-
1360-122-0x0000000000380000-0x00000000003B0000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ