Malware Analysis Report

2025-06-15 23:32

Sample ID 241109-xw36tasrgk
Target b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903
SHA256 b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903
Tags
redline @shakalkesha discovery evasion infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903

Threat Level: Known bad

The file b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903 was found to be: Known bad.

Malicious Activity Summary

redline @shakalkesha discovery evasion infostealer trojan

RedLine

Redline family

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Checks BIOS information in registry

Checks whether UAC is enabled

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 19:13

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 19:13

Reported

2024-11-09 19:15

Platform

win7-20240903-en

Max time kernel

140s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe"

Signatures

RedLine

infostealer redline

Redline family

redline

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe

"C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe"

Network

Country Destination Domain Proto
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp

Files

memory/2936-1-0x00000000002E0000-0x0000000000340000-memory.dmp

memory/2936-0-0x0000000000400000-0x000000000075E000-memory.dmp

memory/2936-8-0x0000000003420000-0x0000000003710000-memory.dmp

memory/2936-59-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-58-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-57-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-56-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-55-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-54-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-53-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-52-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-60-0x0000000000400000-0x000000000075E000-memory.dmp

memory/2936-51-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-50-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-49-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-48-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-47-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-46-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-45-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-44-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-43-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-42-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-41-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-40-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-39-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-38-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-37-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-36-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-35-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-34-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-33-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-32-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-31-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-30-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-29-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-28-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-27-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-26-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-25-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-24-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-23-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-22-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-21-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-20-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-19-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-18-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-17-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-16-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-15-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-14-0x0000000003430000-0x0000000003431000-memory.dmp

memory/2936-13-0x0000000003430000-0x0000000003431000-memory.dmp

memory/2936-12-0x0000000003430000-0x0000000003431000-memory.dmp

memory/2936-11-0x0000000003430000-0x0000000003431000-memory.dmp

memory/2936-10-0x0000000003430000-0x0000000003431000-memory.dmp

memory/2936-9-0x0000000003420000-0x0000000003710000-memory.dmp

memory/2936-7-0x0000000002580000-0x0000000002581000-memory.dmp

memory/2936-6-0x0000000002560000-0x0000000002561000-memory.dmp

memory/2936-5-0x0000000002120000-0x0000000002121000-memory.dmp

memory/2936-4-0x0000000002100000-0x0000000002101000-memory.dmp

memory/2936-3-0x0000000002540000-0x0000000002541000-memory.dmp

memory/2936-2-0x0000000002530000-0x0000000002531000-memory.dmp

memory/2936-61-0x0000000000400000-0x000000000075E000-memory.dmp

memory/2936-62-0x00000000002E0000-0x0000000000340000-memory.dmp

memory/2936-63-0x0000000003420000-0x0000000003710000-memory.dmp

memory/2936-64-0x0000000003420000-0x0000000003710000-memory.dmp

memory/2936-66-0x0000000003420000-0x0000000003421000-memory.dmp

memory/2936-65-0x0000000003430000-0x0000000003431000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 19:13

Reported

2024-11-09 19:15

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe"

Signatures

RedLine

infostealer redline

Redline family

redline

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe

"C:\Users\Admin\AppData\Local\Temp\b5a3293f6e5c3464ec54f929a9656f6fa87a12ebd3651aae302c4901a9c4b903.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 101.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
NL 85.209.89.134:41320 tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
NL 85.209.89.134:41320 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 98.209.201.84.in-addr.arpa udp
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
NL 85.209.89.134:41320 tcp
NL 85.209.89.134:41320 tcp
US 8.8.8.8:53 26.73.42.20.in-addr.arpa udp

Files

memory/1192-0-0x0000000000400000-0x000000000075E000-memory.dmp

memory/1192-1-0x0000000000C70000-0x0000000000CD0000-memory.dmp

memory/1192-66-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-65-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-64-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-63-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-62-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-61-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-60-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-59-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-58-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-57-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-56-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-55-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-54-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-53-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-52-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-51-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-50-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-49-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-48-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-47-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-46-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-45-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-44-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-43-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-42-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-41-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-40-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-39-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-38-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-37-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-36-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-35-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-34-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-33-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-32-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-31-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-30-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-29-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-28-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-27-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-26-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-25-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-24-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-23-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-22-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-21-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-20-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-19-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-18-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-17-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-16-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-15-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-14-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-13-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-12-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-11-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-10-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-9-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-8-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-7-0x00000000026A0000-0x00000000026A1000-memory.dmp

memory/1192-6-0x0000000002680000-0x0000000002681000-memory.dmp

memory/1192-5-0x0000000002630000-0x0000000002631000-memory.dmp

memory/1192-4-0x0000000002610000-0x0000000002611000-memory.dmp

memory/1192-3-0x0000000002660000-0x0000000002661000-memory.dmp

memory/1192-2-0x0000000002650000-0x0000000002651000-memory.dmp

memory/1192-67-0x0000000000400000-0x000000000075E000-memory.dmp

memory/1192-68-0x0000000000400000-0x000000000075E000-memory.dmp

memory/1192-69-0x0000000005DA0000-0x00000000063B8000-memory.dmp

memory/1192-70-0x0000000006440000-0x0000000006452000-memory.dmp

memory/1192-71-0x0000000006460000-0x000000000656A000-memory.dmp

memory/1192-72-0x0000000006570000-0x00000000065AC000-memory.dmp

memory/1192-73-0x00000000065F0000-0x000000000663C000-memory.dmp

memory/1192-74-0x0000000000C70000-0x0000000000CD0000-memory.dmp

memory/1192-77-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-78-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-96-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-95-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-94-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-93-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-92-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-91-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-90-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-89-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-88-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-87-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-86-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-85-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-84-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-83-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-82-0x0000000003540000-0x0000000003541000-memory.dmp

memory/1192-81-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-80-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-79-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-76-0x0000000003550000-0x0000000003551000-memory.dmp

memory/1192-75-0x0000000003550000-0x0000000003551000-memory.dmp