_.pdb
Behavioral task
behavioral1
Sample
1780-2-0x0000000001F20000-0x0000000001F46000-memory.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1780-2-0x0000000001F20000-0x0000000001F46000-memory.dll
Resource
win10v2004-20240709-en
General
-
Target
1780-2-0x0000000001F20000-0x0000000001F46000-memory.dmp
-
Size
152KB
-
MD5
3c68de38b6dc255f72e40a475e730df2
-
SHA1
500bfce5443105c67e3c0a59a48f4e1389249b4c
-
SHA256
db1e6e30cfec79b66adc1834e19cd0c90cabdb279ca8afd638d38562e1e3c7e0
-
SHA512
9a8ba2329b851bba80e25e4dcdfd85fe84af146196355aa2e0460ed654c75a1b69c1b373b9ae9b3d2653e5b87df11cfac20fcdfa6fb7412ff4f2c77648ba5a03
-
SSDEEP
3072:5AKNAz3DIcKhoHhc+qSAdL9xyaFpOafAfW:+KDcciboxyaFn
Malware Config
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1780-2-0x0000000001F20000-0x0000000001F46000-memory.dmp
Files
-
1780-2-0x0000000001F20000-0x0000000001F46000-memory.dmp.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ