Behavioral task
behavioral1
Sample
3052-1-0x0000000001370000-0x00000000017C2000-memory.exe
Resource
win7-20240903-en
General
-
Target
3052-1-0x0000000001370000-0x00000000017C2000-memory.dmp
-
Size
4.3MB
-
MD5
5c883c43945c135676b6742c3a9532df
-
SHA1
e27ea722bc69b43b125d6a2eb23d9a37fe6b0580
-
SHA256
ee31c4cba6b4232ceafa3daa5c1e73249efdba57e4cb63f012b314b49c15d240
-
SHA512
c365c9aadfc714e0d46dea88a17281d0f22d3bc5deb1d409e8a314b403e6ba36c1f0610c746a1380ed70e26ae17337dc7f2db1c51f9981e25254b970fddaf75b
-
SSDEEP
98304:JxylZpEqZcrEAz3Cf+0rFVXxSyFzN0OpuLV+fN9c:SZCrdzyfjX4a50V+V9c
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Signatures
Files
-
3052-1-0x0000000001370000-0x00000000017C2000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE