Behavioral task
behavioral1
Sample
76423fc445c5f6ce818cd453dc23851caa53f25894a84923689d953ed2a936c7.exe
Resource
win10v2004-20240412-en
General
-
Target
76423fc445c5f6ce818cd453dc23851caa53f25894a84923689d953ed2a936c7
-
Size
305KB
-
MD5
2f390e057d71155b44f6a33ec0335887
-
SHA1
b1ad21801b3a78b7b7c6720272aa277d9d51207e
-
SHA256
76423fc445c5f6ce818cd453dc23851caa53f25894a84923689d953ed2a936c7
-
SHA512
5d3208dff3920b42ac5251641cc77992d78cf06a4e6b11013813bc1badb228e6fe01ac20f2366ecc5851ef17dceb29fb289a74f37968426dfa29fad4dfaf5b1e
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 76423fc445c5f6ce818cd453dc23851caa53f25894a84923689d953ed2a936c7
Files
-
76423fc445c5f6ce818cd453dc23851caa53f25894a84923689d953ed2a936c7.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ