Behavioral task
behavioral1
Sample
667eac12d34a2a4580c678621c8339d3561c452e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
667eac12d34a2a4580c678621c8339d3561c452e.exe
Resource
win10v2004-20241007-en
General
-
Target
667eac12d34a2a4580c678621c8339d3561c452e
-
Size
364KB
-
MD5
36130443fc93e4fccf10fce3d851fd79
-
SHA1
667eac12d34a2a4580c678621c8339d3561c452e
-
SHA256
c31ed0ba88f6758fcab3d14567572fedf8125db988932ad08391dd2956ca7b19
-
SHA512
1d51d46ac5828e3153e75e07c38f6d55acd725ecd29890c148304a51c900b299530feff19fcd5be8f14d1e4263dc9f399fbc98c247ce7c4e873cdeb7677cafd5
-
SSDEEP
6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv
Malware Config
Extracted
redline
0002
13.72.81.58:13413
-
auth_value
866ce0ed8cfe2be77fb43a4912677698
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 667eac12d34a2a4580c678621c8339d3561c452e
Files
-
667eac12d34a2a4580c678621c8339d3561c452e.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 356KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ