Behavioral task
behavioral1
Sample
2128-121-0x0000000000BD0000-0x0000000000C82000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2128-121-0x0000000000BD0000-0x0000000000C82000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2128-121-0x0000000000BD0000-0x0000000000C82000-memory.dmp
-
Size
712KB
-
MD5
80024c9b0376c94e20c3bd6c68e8498b
-
SHA1
cd989e8e5012639fb077cceec2fe18a7f9f848eb
-
SHA256
25ff2a818a909f50a0285de4ba07b6f5aea8e40caf2b98d296c88b2e255502e8
-
SHA512
e10111e167df5596fcc423548c36c1d4138a31809fb503ea7412d1c3decb98ca978141f14c13456df758de27610e4c5e23c0cb718d8e5aab90a1d6a3200854e8
-
SSDEEP
12288:t8q21MYZBIZzwINH4rY5YYP5ut3v+xAI7V78R1nebQZ:m5MYZ3rYJ0+xineb
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2128-121-0x0000000000BD0000-0x0000000000C82000-memory.dmp
Files
-
2128-121-0x0000000000BD0000-0x0000000000C82000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 391KB - Virtual size: 390KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HAWKe Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ