Malware Analysis Report

2024-12-01 01:13

Sample ID 241110-t618es1djg
Target 7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c
SHA256 7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c
Tags
redline 24.01 discovery infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c

Threat Level: Known bad

The file 7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c was found to be: Known bad.

Malicious Activity Summary

redline 24.01 discovery infostealer

Redline family

RedLine

System Location Discovery: System Language Discovery

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 16:40

Signatures

Redline family

redline

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 16:40

Reported

2024-11-10 16:43

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe"

Signatures

RedLine

infostealer redline

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe

"C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 100.209.201.84.in-addr.arpa udp
RU 37.220.86.164:29170 tcp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
RU 37.220.86.164:29170 tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
RU 37.220.86.164:29170 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
US 8.8.8.8:53 104.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
US 8.8.8.8:53 13.173.189.20.in-addr.arpa udp

Files

memory/1516-0-0x0000000074BFE000-0x0000000074BFF000-memory.dmp

memory/1516-1-0x0000000000D60000-0x0000000000DBA000-memory.dmp

memory/1516-2-0x0000000003290000-0x0000000003296000-memory.dmp

memory/1516-3-0x0000000074BF0000-0x00000000753A0000-memory.dmp

memory/1516-4-0x000000000B470000-0x000000000BA88000-memory.dmp

memory/1516-5-0x000000000AFB0000-0x000000000B0BA000-memory.dmp

memory/1516-6-0x000000000AEE0000-0x000000000AEF2000-memory.dmp

memory/1516-7-0x000000000AF40000-0x000000000AF7C000-memory.dmp

memory/1516-8-0x0000000003050000-0x000000000309C000-memory.dmp

memory/1516-9-0x0000000074BFE000-0x0000000074BFF000-memory.dmp

memory/1516-10-0x0000000074BF0000-0x00000000753A0000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 16:40

Reported

2024-11-10 16:43

Platform

win7-20241010-en

Max time kernel

149s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe"

Signatures

RedLine

infostealer redline

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe

"C:\Users\Admin\AppData\Local\Temp\7676f853a7cfd3cafb95f47f56657f1c3220e91db12a43b04f61675cc96e792c.exe"

Network

Country Destination Domain Proto
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp
RU 37.220.86.164:29170 tcp

Files

memory/2220-0-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

memory/2220-1-0x00000000003E0000-0x000000000043A000-memory.dmp

memory/2220-2-0x0000000000310000-0x0000000000316000-memory.dmp

memory/2220-3-0x0000000074EB0000-0x000000007559E000-memory.dmp

memory/2220-4-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

memory/2220-5-0x0000000074EB0000-0x000000007559E000-memory.dmp