Malware Analysis Report

2025-08-05 11:05

Sample ID 241111-hm9jxatrbs
Target 399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725
SHA256 399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725
Tags
redline discovery infostealer persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725

Threat Level: Known bad

The file 399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725 was found to be: Known bad.

Malicious Activity Summary

redline discovery infostealer persistence

RedLine payload

Redline family

RedLine

Executes dropped EXE

Adds Run key to start application

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-11 06:52

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-11 06:52

Reported

2024-11-11 06:54

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe

"C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe

Network

Country Destination Domain Proto
FI 77.91.124.251:19069 tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
FI 77.91.124.251:19069 tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
FI 77.91.124.251:19069 tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
FI 77.91.124.251:19069 tcp
FI 77.91.124.251:19069 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
FI 77.91.124.251:19069 tcp
FI 77.91.124.251:19069 tcp
FI 77.91.124.251:19069 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe

MD5 47f978dafeda927083137d749241a5cb
SHA1 6c97b19fcd82b00ab2fb376edf899936c1a50767
SHA256 4d72136d289f0f955553a0610fa8beeccd4e453ed9b9829c94b5de023cf70d46
SHA512 759db6d77e9b52f0c783d0d75adc993cdb6011dd5658f0465bea68125bd2d5bc4ed5ef916c55d7280c7287ff1bf5cccf396cbde5dbefc74701cf729728467c0b

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe

MD5 8f30f7f88229560306c5959c605316de
SHA1 36f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA256 3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512 267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

memory/4568-14-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

memory/4568-15-0x0000000000CD0000-0x0000000000CF8000-memory.dmp

memory/4568-16-0x0000000007F90000-0x00000000085A8000-memory.dmp

memory/4568-17-0x0000000007A30000-0x0000000007A42000-memory.dmp

memory/4568-18-0x0000000007B60000-0x0000000007C6A000-memory.dmp

memory/4568-19-0x0000000007A90000-0x0000000007ACC000-memory.dmp

memory/4568-20-0x0000000074A80000-0x0000000075230000-memory.dmp

memory/4568-21-0x0000000005020000-0x000000000506C000-memory.dmp

memory/4568-22-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

memory/4568-23-0x0000000074A80000-0x0000000075230000-memory.dmp