Malware Analysis Report

2025-01-23 07:45

Sample ID 241107-dwvpwsvdlj
Target e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60
SHA256 e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60
Tags
redline fukia discovery infostealer persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60

Threat Level: Known bad

The file e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60 was found to be: Known bad.

Malicious Activity Summary

redline fukia discovery infostealer persistence

RedLine

RedLine payload

Redline family

Executes dropped EXE

Adds Run key to start application

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 03:21

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 03:21

Reported

2024-11-07 03:24

Platform

win10v2004-20241007-en

Max time kernel

137s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe

"C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
RU 193.233.20.13:4136 tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
RU 193.233.20.13:4136 tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
RU 193.233.20.13:4136 tcp
RU 193.233.20.13:4136 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
RU 193.233.20.13:4136 tcp
RU 193.233.20.13:4136 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe

MD5 93d751ecaef07da2e95688cf5db22982
SHA1 e7e1ab16edd60677d87aff4ae2fcb67513ab4c16
SHA256 dbc511733a93ad972bfb9f2476103e6664e0c1386640ff7afc499891f149eb93
SHA512 eb32e3293fb9a438f8b9bed9da2f2fab7db87fa5f3371f9670d23e1ac56f70b49f47c514d7fe8002f42f9f9fed0a15f5c272ce288dcb412e69294c4dfb3ef381

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe

MD5 a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA1 3d06413341893b838549939e15f8f1eec423d71a
SHA256 1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512 d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

memory/4264-14-0x0000000073C1E000-0x0000000073C1F000-memory.dmp

memory/4264-15-0x0000000000240000-0x0000000000272000-memory.dmp

memory/4264-16-0x00000000051B0000-0x00000000057C8000-memory.dmp

memory/4264-17-0x0000000004D20000-0x0000000004E2A000-memory.dmp

memory/4264-18-0x0000000004C70000-0x0000000004C82000-memory.dmp

memory/4264-19-0x0000000004C90000-0x0000000004CCC000-memory.dmp

memory/4264-20-0x0000000004CD0000-0x0000000004D1C000-memory.dmp

memory/4264-21-0x0000000073C1E000-0x0000000073C1F000-memory.dmp