Malware Analysis Report

2025-05-28 18:28

Sample ID 241109-yyk9fstpfr
Target 8826e394a450bb3aafc7b4d082c1377843fd9842
SHA256 a17f68381ad3f486486a1ec64c08859acd09ced984fc2c6ac454740dcd57e4fe
Tags
redline 123 discovery infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a17f68381ad3f486486a1ec64c08859acd09ced984fc2c6ac454740dcd57e4fe

Threat Level: Known bad

The file 8826e394a450bb3aafc7b4d082c1377843fd9842 was found to be: Known bad.

Malicious Activity Summary

redline 123 discovery infostealer

RedLine payload

Redline family

RedLine

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 20:11

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 20:11

Reported

2024-11-09 20:14

Platform

win7-20240729-en

Max time kernel

144s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe

"C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe"

Network

Country Destination Domain Proto
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp

Files

memory/2744-1-0x0000000000250000-0x0000000000350000-memory.dmp

memory/2744-2-0x0000000000400000-0x0000000000441000-memory.dmp

memory/2744-3-0x0000000000400000-0x00000000005A8000-memory.dmp

memory/2744-4-0x0000000002150000-0x000000000218E000-memory.dmp

memory/2744-5-0x0000000004860000-0x000000000489C000-memory.dmp

memory/2744-6-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-7-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-21-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-43-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-9-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-11-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-13-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-47-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-49-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-45-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-41-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-39-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-37-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-35-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-33-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-31-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-29-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-27-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-25-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-23-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-19-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-17-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-15-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-68-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-69-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-65-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-63-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-61-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-59-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-57-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-55-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-53-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-51-0x0000000004860000-0x0000000004896000-memory.dmp

memory/2744-1234-0x0000000000250000-0x0000000000350000-memory.dmp

memory/2744-1235-0x0000000000400000-0x0000000000441000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 20:11

Reported

2024-11-09 20:14

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe

"C:\Users\Admin\AppData\Local\Temp\8826e394a450bb3aafc7b4d082c1377843fd9842.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 70.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
US 8.8.8.8:53 102.209.201.84.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp
DE 78.153.144.3:2510 tcp

Files

memory/4164-2-0x0000000000810000-0x000000000084E000-memory.dmp

memory/4164-1-0x00000000008B0000-0x00000000009B0000-memory.dmp

memory/4164-3-0x0000000000400000-0x0000000000441000-memory.dmp

memory/4164-4-0x0000000000400000-0x00000000005A8000-memory.dmp

memory/4164-5-0x0000000002420000-0x000000000245E000-memory.dmp

memory/4164-6-0x0000000004C90000-0x0000000005234000-memory.dmp

memory/4164-7-0x00000000027F0000-0x000000000282C000-memory.dmp

memory/4164-8-0x0000000004BD0000-0x0000000004C62000-memory.dmp

memory/4164-52-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-60-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-72-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-70-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-68-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-66-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-62-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-58-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-56-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-54-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-50-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-48-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-46-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-44-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-42-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-40-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-38-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-34-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-32-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-30-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-28-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-26-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-24-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-22-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-20-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-18-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-16-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-14-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-12-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-64-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-10-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-9-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-36-0x00000000027F0000-0x0000000002826000-memory.dmp

memory/4164-1237-0x00000000054A0000-0x0000000005AB8000-memory.dmp

memory/4164-1238-0x00000000052D0000-0x00000000053DA000-memory.dmp

memory/4164-1239-0x00000000008B0000-0x00000000009B0000-memory.dmp

memory/4164-1240-0x0000000005400000-0x0000000005412000-memory.dmp

memory/4164-1241-0x0000000005420000-0x000000000545C000-memory.dmp

memory/4164-1242-0x0000000005BC0000-0x0000000005C0C000-memory.dmp

memory/4164-1243-0x0000000000810000-0x000000000084E000-memory.dmp

memory/4164-1244-0x0000000000400000-0x0000000000441000-memory.dmp