Malware Analysis Report

2025-04-14 07:03

Sample ID 230723-jfh9tade75
Target 2888-62-0x00000000025C0000-0x00000000025F4000-memory.dmp
SHA256 c0c1bda204a11b82eb5422d0b082ff03c2ea57a6af58ec264f816967d382943d
Tags
logsdiller cloud (tg: @logsdillabot) redline discovery infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c0c1bda204a11b82eb5422d0b082ff03c2ea57a6af58ec264f816967d382943d

Threat Level: Known bad

The file 2888-62-0x00000000025C0000-0x00000000025F4000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

logsdiller cloud (tg: @logsdillabot) redline discovery infostealer spyware stealer

Redline family

RedLine

Reads user/profile data of web browsers

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-07-23 07:36

Signatures

Redline family

redline

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-07-23 07:36

Reported

2023-07-23 07:39

Platform

win7-20230712-en

Max time kernel

118s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"

Signatures

RedLine

infostealer redline

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"

Network

Country Destination Domain Proto
FR 178.32.90.250:29608 tcp

Files

memory/2796-54-0x00000000010D0000-0x0000000001104000-memory.dmp

memory/2796-55-0x0000000074280000-0x000000007496E000-memory.dmp

memory/2796-56-0x0000000000330000-0x0000000000336000-memory.dmp

memory/2796-57-0x0000000004960000-0x00000000049A0000-memory.dmp

memory/2796-58-0x0000000074280000-0x000000007496E000-memory.dmp

memory/2796-59-0x0000000004960000-0x00000000049A0000-memory.dmp

memory/2796-60-0x0000000074280000-0x000000007496E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-07-23 07:36

Reported

2023-07-23 07:39

Platform

win10v2004-20230703-en

Max time kernel

141s

Max time network

132s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"

Signatures

RedLine

infostealer redline

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 254.177.238.8.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
FR 178.32.90.250:29608 tcp
US 8.8.8.8:53 250.90.32.178.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp
US 8.8.8.8:53 161.252.72.23.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 211.143.182.52.in-addr.arpa udp

Files

memory/2220-133-0x00000000009E0000-0x0000000000A14000-memory.dmp

memory/2220-134-0x0000000074F70000-0x0000000075720000-memory.dmp

memory/2220-135-0x0000000005AE0000-0x00000000060F8000-memory.dmp

memory/2220-136-0x00000000055D0000-0x00000000056DA000-memory.dmp

memory/2220-137-0x00000000054C0000-0x00000000054D2000-memory.dmp

memory/2220-138-0x00000000053B0000-0x00000000053C0000-memory.dmp

memory/2220-139-0x0000000005520000-0x000000000555C000-memory.dmp

memory/2220-140-0x0000000005820000-0x0000000005896000-memory.dmp

memory/2220-141-0x0000000005940000-0x00000000059D2000-memory.dmp

memory/2220-142-0x0000000006BA0000-0x0000000007144000-memory.dmp

memory/2220-143-0x00000000059E0000-0x0000000005A46000-memory.dmp

memory/2220-144-0x0000000074F70000-0x0000000075720000-memory.dmp

memory/2220-145-0x0000000006470000-0x00000000064C0000-memory.dmp

memory/2220-146-0x00000000053B0000-0x00000000053C0000-memory.dmp

memory/2220-147-0x00000000069C0000-0x0000000006B82000-memory.dmp

memory/2220-148-0x0000000008D70000-0x000000000929C000-memory.dmp

memory/2220-150-0x0000000074F70000-0x0000000075720000-memory.dmp