Malware Analysis Report

2025-03-15 01:44

Sample ID 230910-k4tk5afh8w
Target 0x000a00000001e0cf-54.dat
SHA256 927dffce1baf35a6af33e8f645de335f9f53b2707b563438603cb7dd16c29844
Tags
virad redline infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

927dffce1baf35a6af33e8f645de335f9f53b2707b563438603cb7dd16c29844

Threat Level: Known bad

The file 0x000a00000001e0cf-54.dat was found to be: Known bad.

Malicious Activity Summary

virad redline infostealer

RedLine

Redline family

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-09-10 09:09

Signatures

Redline family

redline

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-10 09:09

Reported

2023-09-10 09:12

Platform

win7-20230831-en

Max time kernel

141s

Max time network

159s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0x000a00000001e0cf-54.exe"

Signatures

RedLine

infostealer redline

Processes

C:\Users\Admin\AppData\Local\Temp\0x000a00000001e0cf-54.exe

"C:\Users\Admin\AppData\Local\Temp\0x000a00000001e0cf-54.exe"

Network

Country Destination Domain Proto
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp

Files

memory/2792-0-0x0000000000B50000-0x0000000000B80000-memory.dmp

memory/2792-1-0x0000000074A50000-0x000000007513E000-memory.dmp

memory/2792-2-0x0000000000300000-0x0000000000306000-memory.dmp

memory/2792-3-0x00000000046A0000-0x00000000046E0000-memory.dmp

memory/2792-4-0x0000000074A50000-0x000000007513E000-memory.dmp

memory/2792-5-0x00000000046A0000-0x00000000046E0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-10 09:09

Reported

2023-09-10 09:12

Platform

win10v2004-20230831-en

Max time kernel

141s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0x000a00000001e0cf-54.exe"

Signatures

RedLine

infostealer redline

Processes

C:\Users\Admin\AppData\Local\Temp\0x000a00000001e0cf-54.exe

"C:\Users\Admin\AppData\Local\Temp\0x000a00000001e0cf-54.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
FI 77.91.124.82:19071 tcp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 1.202.248.87.in-addr.arpa udp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
FI 77.91.124.82:19071 tcp
US 8.8.8.8:53 90.65.42.20.in-addr.arpa udp

Files

memory/4564-0-0x0000000075040000-0x00000000757F0000-memory.dmp

memory/4564-1-0x0000000000BD0000-0x0000000000C00000-memory.dmp

memory/4564-2-0x000000000B030000-0x000000000B648000-memory.dmp

memory/4564-3-0x000000000AB30000-0x000000000AC3A000-memory.dmp

memory/4564-5-0x000000000AA70000-0x000000000AA82000-memory.dmp

memory/4564-4-0x0000000005680000-0x0000000005690000-memory.dmp

memory/4564-6-0x000000000AAD0000-0x000000000AB0C000-memory.dmp

memory/4564-7-0x0000000075040000-0x00000000757F0000-memory.dmp

memory/4564-8-0x0000000005680000-0x0000000005690000-memory.dmp