Malware Analysis Report

2025-03-15 05:13

Sample ID 231211-fzv6yafde6
Target f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a
SHA256 f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a
Tags
redline livetraffic infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a

Threat Level: Known bad

The file f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a was found to be: Known bad.

Malicious Activity Summary

redline livetraffic infostealer

RedLine

RedLine payload

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-11 05:19

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-11 05:19

Reported

2023-12-11 05:28

Platform

win7-20231023-en

Max time kernel

299s

Max time network

307s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a.exe

"C:\Users\Admin\AppData\Local\Temp\f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a.exe"

Network

Country Destination Domain Proto
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp

Files

memory/2780-0-0x0000000000270000-0x00000000002AC000-memory.dmp

memory/2780-5-0x0000000074150000-0x000000007483E000-memory.dmp

memory/2780-6-0x0000000004A80000-0x0000000004AC0000-memory.dmp

memory/2780-7-0x0000000074150000-0x000000007483E000-memory.dmp

memory/2780-8-0x0000000004A80000-0x0000000004AC0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-11 05:19

Reported

2023-12-11 05:28

Platform

win10-20231129-en

Max time kernel

297s

Max time network

299s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a.exe

"C:\Users\Admin\AppData\Local\Temp\f0d84b34e662196f3d6c0e0bd943b827311bdf125db57dc3d3b95e77f449d21a.exe"

Network

Country Destination Domain Proto
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
US 8.8.8.8:53 114.110.16.96.in-addr.arpa udp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 19.53.126.40.in-addr.arpa udp
RU 77.105.132.87:14418 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 44.246.107.13.in-addr.arpa udp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
RU 77.105.132.87:14418 tcp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
RU 77.105.132.87:14418 tcp

Files

memory/3144-0-0x0000000000540000-0x000000000057C000-memory.dmp

memory/3144-5-0x0000000073590000-0x0000000073C7E000-memory.dmp

memory/3144-6-0x0000000007570000-0x0000000007A6E000-memory.dmp

memory/3144-7-0x0000000007150000-0x00000000071E2000-memory.dmp

memory/3144-8-0x00000000072B0000-0x00000000072C0000-memory.dmp

memory/3144-9-0x0000000000ED0000-0x0000000000EDA000-memory.dmp

memory/3144-12-0x0000000009BF0000-0x0000000009C02000-memory.dmp

memory/3144-13-0x0000000009C50000-0x0000000009C8E000-memory.dmp

memory/3144-14-0x0000000009C90000-0x0000000009CDB000-memory.dmp

memory/3144-11-0x0000000009CE0000-0x0000000009DEA000-memory.dmp

memory/3144-10-0x0000000008480000-0x0000000008A86000-memory.dmp

memory/3144-15-0x0000000073590000-0x0000000073C7E000-memory.dmp

memory/3144-16-0x00000000072B0000-0x00000000072C0000-memory.dmp