Behavioral task
behavioral1
Sample
4140-1345-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4140-1345-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win10v2004-20250129-en
General
-
Target
4140-1345-0x0000000000400000-0x000000000041E000-memory.dmp
-
Size
120KB
-
MD5
02fff5c56e84c1e9e3c9b2f0a407b64b
-
SHA1
7b7fe987c9d2aee9499df1177c601d75e5828318
-
SHA256
9acdd5562f39f8bc7f0b8c087d9bc018e60ff812aa8f95118f86bbbe532efc8e
-
SHA512
ed72f9e87eb6e51b7ced90cfdcf110e2f7725bf06086a373707a8cd258ccf0eea89bd205a6fb95be8064252a04886fc50ba99daf9e99c8d378037e182a6334c8
-
SSDEEP
1536:NqsIoqu3lbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2rtmulgS6pIl:7Z1FYH+zi0ZbYe1g0ujyzdbI
Malware Config
Extracted
redline
Install_bot6
101.99.92.189:57725
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4140-1345-0x0000000000400000-0x000000000041E000-memory.dmp
Files
-
4140-1345-0x0000000000400000-0x000000000041E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ