Malware Analysis Report

2025-01-18 07:12

Sample ID 230813-x3fzvsfh6y
Target 2284-61-0x0000000004020000-0x0000000004054000-memory.dmp
SHA256 3fa9a487f0ccf9b4558a9efa7f149c239747bb258360379be2182cf8357f48b4
Tags
logsdiller cloud (tg: @logsdillabot) redline infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3fa9a487f0ccf9b4558a9efa7f149c239747bb258360379be2182cf8357f48b4

Threat Level: Known bad

The file 2284-61-0x0000000004020000-0x0000000004054000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

logsdiller cloud (tg: @logsdillabot) redline infostealer

Redline family

RedLine

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-13 19:22

Signatures

Redline family

redline

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-13 19:22

Reported

2023-08-13 19:25

Platform

win7-20230712-en

Max time kernel

132s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2284-61-0x0000000004020000-0x0000000004054000-memory.exe"

Signatures

RedLine

infostealer redline

Processes

C:\Users\Admin\AppData\Local\Temp\2284-61-0x0000000004020000-0x0000000004054000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\2284-61-0x0000000004020000-0x0000000004054000-memory.exe"

Network

Country Destination Domain Proto
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp

Files

memory/744-53-0x00000000010C0000-0x00000000010F4000-memory.dmp

memory/744-54-0x0000000074810000-0x0000000074EFE000-memory.dmp

memory/744-55-0x0000000000300000-0x0000000000306000-memory.dmp

memory/744-56-0x0000000000A00000-0x0000000000A40000-memory.dmp

memory/744-57-0x0000000074810000-0x0000000074EFE000-memory.dmp

memory/744-58-0x0000000000A00000-0x0000000000A40000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-13 19:22

Reported

2023-08-13 19:25

Platform

win10v2004-20230703-en

Max time kernel

139s

Max time network

159s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2284-61-0x0000000004020000-0x0000000004054000-memory.exe"

Signatures

RedLine

infostealer redline

Processes

C:\Users\Admin\AppData\Local\Temp\2284-61-0x0000000004020000-0x0000000004054000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\2284-61-0x0000000004020000-0x0000000004054000-memory.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 154.252.72.23.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 163.252.72.23.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 2.77.109.52.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 226.162.46.104.in-addr.arpa udp

Files

memory/2656-133-0x0000000000720000-0x0000000000754000-memory.dmp

memory/2656-134-0x0000000074DC0000-0x0000000075570000-memory.dmp

memory/2656-135-0x0000000005820000-0x0000000005E38000-memory.dmp

memory/2656-136-0x0000000005310000-0x000000000541A000-memory.dmp

memory/2656-138-0x0000000005200000-0x0000000005212000-memory.dmp

memory/2656-137-0x00000000050F0000-0x0000000005100000-memory.dmp

memory/2656-139-0x0000000005260000-0x000000000529C000-memory.dmp

memory/2656-140-0x0000000074DC0000-0x0000000075570000-memory.dmp

memory/2656-141-0x00000000050F0000-0x0000000005100000-memory.dmp