Malware Analysis Report

2025-01-18 07:41

Sample ID 230815-sjgd3adb9z
Target 04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe
SHA256 04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4
Tags
redline logsdiller cloud (tg: @logsdillabot) infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4

Threat Level: Known bad

The file 04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe was found to be: Known bad.

Malicious Activity Summary

redline logsdiller cloud (tg: @logsdillabot) infostealer

RedLine

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-15 15:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-15 15:09

Reported

2023-08-15 15:11

Platform

win10v2004-20230703-en

Max time kernel

142s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe

"C:\Users\Admin\AppData\Local\Temp\04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 254.131.255.8.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 7.173.189.20.in-addr.arpa udp

Files

memory/1224-134-0x0000000002580000-0x0000000002680000-memory.dmp

memory/1224-135-0x0000000003F20000-0x0000000003F5F000-memory.dmp

memory/1224-136-0x0000000000400000-0x00000000022FD000-memory.dmp

memory/1224-137-0x0000000004090000-0x00000000040A0000-memory.dmp

memory/1224-138-0x00000000746A0000-0x0000000074E50000-memory.dmp

memory/1224-139-0x0000000004090000-0x00000000040A0000-memory.dmp

memory/1224-140-0x0000000006A20000-0x0000000006FC4000-memory.dmp

memory/1224-141-0x00000000070D0000-0x00000000076E8000-memory.dmp

memory/1224-142-0x00000000076F0000-0x00000000077FA000-memory.dmp

memory/1224-143-0x00000000046B0000-0x00000000046C2000-memory.dmp

memory/1224-144-0x0000000004090000-0x00000000040A0000-memory.dmp

memory/1224-145-0x0000000007800000-0x000000000783C000-memory.dmp

memory/1224-146-0x0000000002580000-0x0000000002680000-memory.dmp

memory/1224-147-0x0000000003F20000-0x0000000003F5F000-memory.dmp

memory/1224-148-0x0000000000400000-0x00000000022FD000-memory.dmp

memory/1224-149-0x00000000746A0000-0x0000000074E50000-memory.dmp

memory/1224-151-0x0000000004090000-0x00000000040A0000-memory.dmp

memory/1224-152-0x0000000004090000-0x00000000040A0000-memory.dmp

memory/1224-153-0x0000000004090000-0x00000000040A0000-memory.dmp

memory/1224-154-0x0000000004090000-0x00000000040A0000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-15 15:09

Reported

2023-08-15 15:11

Platform

win7-20230712-en

Max time kernel

141s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe"

Signatures

RedLine

infostealer redline

Processes

C:\Users\Admin\AppData\Local\Temp\04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe

"C:\Users\Admin\AppData\Local\Temp\04eda95779ded417ce8c151a83ce783f2369df3e660caf7ba3a09fb0310352f4_JC.exe"

Network

Country Destination Domain Proto
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp
NL 209.250.248.11:33522 tcp

Files

memory/1148-55-0x0000000002470000-0x0000000002570000-memory.dmp

memory/1148-56-0x0000000003F30000-0x0000000003F68000-memory.dmp

memory/1148-57-0x0000000000400000-0x00000000022FD000-memory.dmp

memory/1148-58-0x00000000067F0000-0x0000000006830000-memory.dmp

memory/1148-59-0x00000000067F0000-0x0000000006830000-memory.dmp

memory/1148-60-0x0000000000250000-0x000000000028F000-memory.dmp

memory/1148-62-0x0000000074500000-0x0000000074BEE000-memory.dmp

memory/1148-61-0x0000000003D90000-0x0000000003DC4000-memory.dmp

memory/1148-64-0x0000000002460000-0x0000000002466000-memory.dmp

memory/1148-63-0x00000000067F0000-0x0000000006830000-memory.dmp

memory/1148-65-0x00000000067F0000-0x0000000006830000-memory.dmp

memory/1148-66-0x0000000002470000-0x0000000002570000-memory.dmp

memory/1148-67-0x0000000000400000-0x00000000022FD000-memory.dmp

memory/1148-69-0x00000000067F0000-0x0000000006830000-memory.dmp

memory/1148-70-0x0000000074500000-0x0000000074BEE000-memory.dmp

memory/1148-71-0x00000000067F0000-0x0000000006830000-memory.dmp