Behavioral task
behavioral1
Sample
3136-9-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3136-9-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3136-9-0x0000000000400000-0x0000000000450000-memory.dmp
-
Size
320KB
-
MD5
583d765333af7d43405f6e1c088e1f2d
-
SHA1
37b44c71715c28b69059238de76ea8ebc83c679a
-
SHA256
fb931be1c99b87183753d9cd63fb87ae3b9b13a5c8dbc5a2240fc43e72f395a0
-
SHA512
debe6f603c0e3a176a53a8befb88b974f9eda699029b064381330372a0d5fc2164a1af04a5a3fd874fdea7bede2374adb49d3e62b26a865e6f519f9219e8f69c
-
SSDEEP
3072:AcZqf7D34QpVMQGBcdltvplzSpLCsAbwst1TkxnqpgaAxyDeqiOL2bBOU:AcZqf7DIgOQPplzSpPi1TkBxxytL
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3136-9-0x0000000000400000-0x0000000000450000-memory.dmp
Files
-
3136-9-0x0000000000400000-0x0000000000450000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ