Malware Analysis Report

2025-01-18 07:42

Sample ID 230815-gtms2sha78
Target e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f
SHA256 e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f
Tags
redline logsdiller cloud (tg: @logsdillabot) infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f

Threat Level: Known bad

The file e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f was found to be: Known bad.

Malicious Activity Summary

redline logsdiller cloud (tg: @logsdillabot) infostealer spyware stealer

RedLine

Reads user/profile data of web browsers

Accesses cryptocurrency files/wallets, possible credential harvesting

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-15 06:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-15 06:05

Reported

2023-08-15 06:08

Platform

win10-20230703-en

Max time kernel

98s

Max time network

103s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe"

Signatures

RedLine

infostealer redline

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe

"C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe"

Network

Country Destination Domain Proto
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 21.170.83.51.in-addr.arpa udp
US 8.8.8.8:53 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 2.77.109.52.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp

Files

memory/656-121-0x0000000001B50000-0x0000000001B8F000-memory.dmp

memory/656-120-0x0000000001B20000-0x0000000001B49000-memory.dmp

memory/656-122-0x0000000000400000-0x00000000018D2000-memory.dmp

memory/656-123-0x0000000005F40000-0x0000000005F78000-memory.dmp

memory/656-124-0x0000000073280000-0x000000007396E000-memory.dmp

memory/656-126-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-125-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-127-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-128-0x0000000006130000-0x000000000662E000-memory.dmp

memory/656-129-0x0000000005FC0000-0x0000000005FF4000-memory.dmp

memory/656-130-0x00000000060A0000-0x00000000060A6000-memory.dmp

memory/656-131-0x000000000BF40000-0x000000000C546000-memory.dmp

memory/656-132-0x000000000C580000-0x000000000C68A000-memory.dmp

memory/656-134-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-133-0x000000000C6C0000-0x000000000C6D2000-memory.dmp

memory/656-135-0x000000000C720000-0x000000000C75E000-memory.dmp

memory/656-136-0x000000000C780000-0x000000000C7CB000-memory.dmp

memory/656-137-0x0000000001B20000-0x0000000001B49000-memory.dmp

memory/656-138-0x0000000000400000-0x00000000018D2000-memory.dmp

memory/656-139-0x0000000001B50000-0x0000000001B8F000-memory.dmp

memory/656-140-0x0000000073280000-0x000000007396E000-memory.dmp

memory/656-141-0x000000000C8C0000-0x000000000C936000-memory.dmp

memory/656-142-0x000000000C940000-0x000000000C9D2000-memory.dmp

memory/656-143-0x000000000C9E0000-0x000000000CA46000-memory.dmp

memory/656-144-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-145-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-146-0x000000000DF30000-0x000000000E0F2000-memory.dmp

memory/656-147-0x000000000E110000-0x000000000E63C000-memory.dmp

memory/656-148-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-149-0x000000000D440000-0x000000000D490000-memory.dmp

memory/656-150-0x0000000006120000-0x0000000006130000-memory.dmp

memory/656-152-0x0000000000400000-0x00000000018D2000-memory.dmp

memory/656-153-0x0000000073280000-0x000000007396E000-memory.dmp