Behavioral task
behavioral1
Sample
4696-192-0x00000000034A0000-0x00000000034C2000-memory.exe
Resource
win7-20240221-en
General
-
Target
4696-192-0x00000000034A0000-0x00000000034C2000-memory.dmp
-
Size
136KB
-
MD5
f250903c17a2d6e214c606b383986d3f
-
SHA1
c0a0c89dfe4affa451221b28be32b7e23166a56c
-
SHA256
c6e9238d51cb159d53e8ed2267dda91451a48069bada75809e7dc25e6f57c6de
-
SHA512
cb4cbe63f30e5cb20eabd096ef57ffc8b9283475eb96372dd66247968ce5f703b63710fcea9fb8336ad0a94dce3f273e35310d2fdae99a5095cbf44e870c3d22
-
SSDEEP
3072:Sia0DxF//28tuuoq6AIL6X68OwzyG0V/q1gm:SixDx9u8t9XO0zyG+/qH
Malware Config
Extracted
redline
she
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4696-192-0x00000000034A0000-0x00000000034C2000-memory.dmp
Files
-
4696-192-0x00000000034A0000-0x00000000034C2000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ