Malware Analysis Report

2024-12-01 01:00

Sample ID 241110-nldnqswblk
Target e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc
SHA256 e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc
Tags
redline asia discovery infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc

Threat Level: Known bad

The file e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc was found to be: Known bad.

Malicious Activity Summary

redline asia discovery infostealer

RedLine

RedLine payload

Redline family

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 11:28

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 11:28

Reported

2024-11-10 11:31

Platform

win7-20240903-en

Max time kernel

140s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe

"C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe"

Network

Country Destination Domain Proto
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp

Files

memory/2420-1-0x0000000000280000-0x00000000002B9000-memory.dmp

memory/2420-0-0x00000000001B0000-0x00000000001DB000-memory.dmp

memory/2420-2-0x0000000000400000-0x000000000043C000-memory.dmp

memory/2420-3-0x0000000000400000-0x0000000000836000-memory.dmp

memory/2420-4-0x00000000024E0000-0x0000000002514000-memory.dmp

memory/2420-5-0x0000000002510000-0x0000000002542000-memory.dmp

memory/2420-6-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-9-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-19-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-15-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-13-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-11-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-7-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-45-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-70-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-67-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-66-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-63-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-61-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-59-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-57-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-55-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-53-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-51-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-49-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-47-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-43-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-41-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-39-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-37-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-35-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-33-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-31-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-30-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-27-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-25-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-23-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-21-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-17-0x0000000002510000-0x000000000253D000-memory.dmp

memory/2420-961-0x00000000001B0000-0x00000000001DB000-memory.dmp

memory/2420-962-0x0000000000280000-0x00000000002B9000-memory.dmp

memory/2420-963-0x0000000000400000-0x000000000043C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 11:28

Reported

2024-11-10 11:31

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe

"C:\Users\Admin\AppData\Local\Temp\e5baa701c5c6c28361fa99c83615e9eabfc458c38589a1b715247b699a4cb1bc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
NL 45.9.20.240:46257 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
NL 45.9.20.240:46257 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
NL 45.9.20.240:46257 tcp
NL 45.9.20.240:46257 tcp

Files

memory/1596-0-0x00000000009A0000-0x00000000009CB000-memory.dmp

memory/1596-1-0x0000000000CF0000-0x0000000000D29000-memory.dmp

memory/1596-2-0x0000000000400000-0x000000000043C000-memory.dmp

memory/1596-3-0x0000000000400000-0x0000000000836000-memory.dmp

memory/1596-4-0x0000000002760000-0x0000000002794000-memory.dmp

memory/1596-5-0x0000000004F90000-0x0000000005534000-memory.dmp

memory/1596-6-0x0000000002B10000-0x0000000002B42000-memory.dmp

memory/1596-68-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-70-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-66-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-64-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-62-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-60-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-58-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-56-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-54-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-52-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-50-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-46-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-44-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-42-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-40-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-38-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-36-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-34-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-32-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-30-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-26-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-24-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-23-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-18-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-16-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-14-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-12-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-10-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-48-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-28-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-20-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-8-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-7-0x0000000002B10000-0x0000000002B3D000-memory.dmp

memory/1596-961-0x00000000055D0000-0x0000000005BE8000-memory.dmp

memory/1596-962-0x0000000005C30000-0x0000000005C42000-memory.dmp

memory/1596-963-0x0000000005C50000-0x0000000005D5A000-memory.dmp

memory/1596-964-0x0000000005D80000-0x0000000005DBC000-memory.dmp

memory/1596-965-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

memory/1596-966-0x00000000009A0000-0x00000000009CB000-memory.dmp

memory/1596-967-0x0000000000CF0000-0x0000000000D29000-memory.dmp

memory/1596-968-0x0000000000400000-0x000000000043C000-memory.dmp