Malware Analysis Report

2025-04-14 06:02

Sample ID 230925-b4b7eabc3t
Target cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0
SHA256 cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0
Tags
redline logsdiller cloud (tg: @logsdillabot) infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0

Threat Level: Known bad

The file cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0 was found to be: Known bad.

Malicious Activity Summary

redline logsdiller cloud (tg: @logsdillabot) infostealer

RedLine

Suspicious use of SetThreadContext

Program crash

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-09-25 01:41

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-25 01:41

Reported

2023-09-25 01:49

Platform

win7-20230831-en

Max time kernel

290s

Max time network

302s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe"

Signatures

RedLine

infostealer redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2396 set thread context of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2396 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\SysWOW64\WerFault.exe
PID 2396 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\SysWOW64\WerFault.exe
PID 2396 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\SysWOW64\WerFault.exe
PID 2396 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe

"C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 92

Network

Country Destination Domain Proto
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp

Files

memory/880-0-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-1-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-2-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-3-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-5-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/880-9-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-7-0x0000000000400000-0x0000000000430000-memory.dmp

memory/880-10-0x0000000074000000-0x00000000746EE000-memory.dmp

memory/880-11-0x00000000003C0000-0x00000000003C6000-memory.dmp

memory/880-12-0x0000000000CF0000-0x0000000000D30000-memory.dmp

memory/880-13-0x0000000074000000-0x00000000746EE000-memory.dmp

memory/880-14-0x0000000000CF0000-0x0000000000D30000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-25 01:41

Reported

2023-09-25 01:49

Platform

win10-20230915-en

Max time kernel

290s

Max time network

306s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe"

Signatures

RedLine

infostealer redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5072 set thread context of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5072 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Processes

C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe

"C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 244

Network

Country Destination Domain Proto
US 8.8.8.8:53 c.c.c.c.c.c.c.c.c.c.c.c.c.c.c.c.5.6.5.6.2.7.6.4.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.121.18.2.in-addr.arpa udp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
US 8.8.8.8:53 126.209.247.8.in-addr.arpa udp
US 8.8.8.8:53 253.15.104.51.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp
GB 51.38.95.107:42494 tcp

Files

memory/5036-0-0x0000000000400000-0x0000000000430000-memory.dmp

memory/5036-4-0x0000000073B80000-0x000000007426E000-memory.dmp

memory/5036-5-0x0000000006C20000-0x0000000006C26000-memory.dmp

memory/5036-6-0x000000000EC50000-0x000000000F256000-memory.dmp

memory/5036-7-0x000000000E7E0000-0x000000000E8EA000-memory.dmp

memory/5036-8-0x00000000092B0000-0x00000000092C0000-memory.dmp

memory/5036-9-0x000000000E710000-0x000000000E722000-memory.dmp

memory/5036-10-0x000000000E770000-0x000000000E7AE000-memory.dmp

memory/5036-11-0x000000000E8F0000-0x000000000E93B000-memory.dmp

memory/5036-16-0x0000000073B80000-0x000000007426E000-memory.dmp

memory/5036-17-0x00000000092B0000-0x00000000092C0000-memory.dmp