Behavioral task
behavioral1
Sample
ca1733febd360c12cdba541d7d0bc359dca65f53.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ca1733febd360c12cdba541d7d0bc359dca65f53.exe
Resource
win10v2004-20241007-en
General
-
Target
ca1733febd360c12cdba541d7d0bc359dca65f53
-
Size
360KB
-
MD5
6127eeb8d509ef60c171d358d524f5d0
-
SHA1
ca1733febd360c12cdba541d7d0bc359dca65f53
-
SHA256
a50c1f041ec2e1b5223a98f5c52f57d7136ad773e8a21bdb245f2ba650c053f5
-
SHA512
bc68be8e4e6b10ec0c08e5f2f5936825dc6d8545caa9a4f8d3bb739e3c3b9d2b5889df7458b612f4852170ddc6abdbdd042759838744dc85774db4686ed7ce31
-
SSDEEP
6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv
Malware Config
Extracted
redline
0002
13.72.81.58:13413
-
auth_value
866ce0ed8cfe2be77fb43a4912677698
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca1733febd360c12cdba541d7d0bc359dca65f53
Files
-
ca1733febd360c12cdba541d7d0bc359dca65f53.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 356KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ