Malware Analysis Report

2025-06-15 23:47

Sample ID 241112-ysevgstjhq
Target 18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45
SHA256 18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45
Tags
redline discovery infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45

Threat Level: Known bad

The file 18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45 was found to be: Known bad.

Malicious Activity Summary

redline discovery infostealer

RedLine

RedLine payload

Redline family

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-12 20:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-12 20:02

Reported

2024-11-12 20:05

Platform

win7-20240903-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe

"C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe"

Network

Country Destination Domain Proto
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp

Files

memory/1316-1-0x0000000000C60000-0x0000000000D60000-memory.dmp

memory/1316-2-0x0000000000220000-0x0000000000266000-memory.dmp

memory/1316-3-0x0000000000400000-0x0000000000449000-memory.dmp

memory/1316-4-0x0000000000400000-0x000000000081E000-memory.dmp

memory/1316-5-0x00000000009B0000-0x00000000009EC000-memory.dmp

memory/1316-6-0x0000000000C20000-0x0000000000C5A000-memory.dmp

memory/1316-7-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-8-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-10-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-14-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-44-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-12-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-16-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-18-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-70-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-68-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-66-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-64-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-62-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-60-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-58-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-56-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-54-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-52-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-50-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-48-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-46-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-42-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-40-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-38-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-36-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-34-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-32-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-30-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-28-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-26-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-24-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-22-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-20-0x0000000000C20000-0x0000000000C55000-memory.dmp

memory/1316-799-0x0000000000C60000-0x0000000000D60000-memory.dmp

memory/1316-800-0x0000000000220000-0x0000000000266000-memory.dmp

memory/1316-801-0x0000000000400000-0x0000000000449000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-12 20:02

Reported

2024-11-12 20:05

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe

"C:\Users\Admin\AppData\Local\Temp\18199b3c169543fe294fa0d458aadbc84a3781217fdb66681d4db4936fad8d45.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
RU 185.161.248.152:38452 tcp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
RU 185.161.248.152:38452 tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
RU 185.161.248.152:38452 tcp
US 8.8.8.8:53 69.209.201.84.in-addr.arpa udp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
RU 185.161.248.152:38452 tcp
RU 185.161.248.152:38452 tcp
US 8.8.8.8:53 udp

Files

memory/1384-1-0x0000000000840000-0x0000000000940000-memory.dmp

memory/1384-2-0x0000000002560000-0x00000000025A6000-memory.dmp

memory/1384-3-0x0000000000400000-0x0000000000449000-memory.dmp

memory/1384-4-0x0000000000400000-0x000000000081E000-memory.dmp

memory/1384-5-0x00000000029A0000-0x00000000029DC000-memory.dmp

memory/1384-6-0x0000000004F90000-0x0000000005534000-memory.dmp

memory/1384-7-0x0000000005580000-0x00000000055BA000-memory.dmp

memory/1384-51-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-71-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-69-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-67-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-65-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-63-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-61-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-801-0x00000000080E0000-0x00000000080F2000-memory.dmp

memory/1384-802-0x0000000008100000-0x000000000820A000-memory.dmp

memory/1384-800-0x0000000007A80000-0x0000000008098000-memory.dmp

memory/1384-59-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-57-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-55-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-803-0x0000000008220000-0x000000000825C000-memory.dmp

memory/1384-53-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-49-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-48-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-45-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-43-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-41-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-39-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-37-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-35-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-33-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-31-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-29-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-28-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-25-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-23-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-21-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-17-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-15-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-13-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-11-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-9-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-804-0x0000000004A50000-0x0000000004A9C000-memory.dmp

memory/1384-19-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-8-0x0000000005580000-0x00000000055B5000-memory.dmp

memory/1384-805-0x0000000000840000-0x0000000000940000-memory.dmp

memory/1384-806-0x0000000002560000-0x00000000025A6000-memory.dmp

memory/1384-807-0x0000000000400000-0x0000000000449000-memory.dmp