Behavioral task
behavioral1
Sample
2012-0-0x00000000010E0000-0x000000000115D000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2012-0-0x00000000010E0000-0x000000000115D000-memory.exe
Resource
win10v2004-20240412-en
General
-
Target
2012-0-0x00000000010E0000-0x000000000115D000-memory.dmp
-
Size
500KB
-
MD5
4c568cc2ee5f69f682465d93ab05c27b
-
SHA1
2dc76faa4ecca49d3387fafaf1bb4ba08010b191
-
SHA256
18d6eebc1497c403ef1848d04e28f82b9295cbae55d9b5a7f532822d1b7a5a78
-
SHA512
1cd6e621f1b25e98802fc7e25ffd3358091af1549dc5678bc53122726ba8c1b478ceab60a9cb0c03708ea34e6b45e3b2e79c712da613b28f030ddc9ec0292292
-
SSDEEP
6144:CH/xfvJ+F0hooH0v2RhjW44IslqY6i8wPvZyR+TAfAXIcZqf7DIvLBPEpeE:ClvUF0hooUK3ilwwPARBAXIcUzsvYeE
Malware Config
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2012-0-0x00000000010E0000-0x000000000115D000-memory.dmp
Files
-
2012-0-0x00000000010E0000-0x000000000115D000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 309KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ