Behavioral task
behavioral1
Sample
1996-17-0x000000001AA50000-0x000000001AA6E000-memory.exe
Resource
win7-20240221-en
General
-
Target
1996-17-0x000000001AA50000-0x000000001AA6E000-memory.dmp
-
Size
120KB
-
MD5
b53ccdd853fc41b4422148e748d2f13e
-
SHA1
5c3a3eb135db8b3b46bc7b5084b7ee1771234be4
-
SHA256
89b5c5ee577bb1894497d7a5d07b3134147e62cae4299ed59700d73f9aad56d9
-
SHA512
5aa0c22d8e65e6c77f36b57cd1b83102504057b14a1f45913f727b61f96d7ba6be3883e2dcbd8e11a0b4abecd3fc873ff9568f87c6dd3d5fcb2eaa957f3978d0
-
SSDEEP
1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2w3tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdyY
Malware Config
Extracted
redline
cheat
103.168.67.9:57395
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1996-17-0x000000001AA50000-0x000000001AA6E000-memory.dmp
Files
-
1996-17-0x000000001AA50000-0x000000001AA6E000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ