Behavioral task
behavioral1
Sample
1620-2-0x00000000004A0000-0x00000000004C2000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1620-2-0x00000000004A0000-0x00000000004C2000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
1620-2-0x00000000004A0000-0x00000000004C2000-memory.dmp
-
Size
136KB
-
MD5
00bda418308d8253ff6356ea6e2fed07
-
SHA1
fedc847312da30002179c1c8e32f81851dba36cd
-
SHA256
0d75f0e3784a1de839986484772c66b623d763ca8a38dee480cbfefbb6245219
-
SHA512
ecf485eaa149e1ca5c413b2357fd9a8b9cab3b5831cdc07b82406a9a4bc72dc3a2e759a0f381ab6dabd7ed2d3baeec8f8ad00d4b556ca314ef8780ae3cf3ff6e
-
SSDEEP
1536:kG6qTaoigHed/g8pT0NM0MTn3qIzDmYw4o8WDLVi8nJZcI3DvvjbuVGdynvryp/P:B3epgGb3q+DmYwXVi4wIzDynzyJdDrd
Malware Config
Extracted
redline
141.94.188.138:46419
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1620-2-0x00000000004A0000-0x00000000004C2000-memory.dmp
Files
-
1620-2-0x00000000004A0000-0x00000000004C2000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ