Malware Analysis Report

2024-12-07 04:08

Sample ID 241113-y5qgraydpg
Target 1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd
SHA256 1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd
Tags
redline discovery infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd

Threat Level: Known bad

The file 1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd was found to be: Known bad.

Malicious Activity Summary

redline discovery infostealer

RedLine

RedLine payload

Redline family

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-13 20:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 20:22

Reported

2024-11-13 20:24

Platform

win7-20240903-en

Max time kernel

149s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe

"C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe"

Network

Country Destination Domain Proto
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp

Files

memory/1916-1-0x0000000000250000-0x0000000000350000-memory.dmp

memory/1916-2-0x0000000000400000-0x0000000000449000-memory.dmp

memory/1916-3-0x0000000004730000-0x000000000476C000-memory.dmp

memory/1916-4-0x0000000004770000-0x00000000047AA000-memory.dmp

memory/1916-5-0x0000000000400000-0x0000000002BC9000-memory.dmp

memory/1916-69-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-67-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-65-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-63-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-61-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-59-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-57-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-55-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-53-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-51-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-49-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-47-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-45-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-43-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-41-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-39-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-37-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-35-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-33-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-31-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-29-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-27-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-25-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-23-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-21-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-19-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-17-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-15-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-13-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-11-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-9-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-7-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-6-0x0000000004770000-0x00000000047A5000-memory.dmp

memory/1916-798-0x0000000000250000-0x0000000000350000-memory.dmp

memory/1916-799-0x0000000000400000-0x0000000000449000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-13 20:22

Reported

2024-11-13 20:24

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe

"C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 68.144.22.2.in-addr.arpa udp
RU 185.161.248.153:38452 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
RU 185.161.248.153:38452 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 82.190.18.2.in-addr.arpa udp
RU 185.161.248.153:38452 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
RU 185.161.248.153:38452 tcp
RU 185.161.248.153:38452 tcp
US 8.8.8.8:53 200.64.52.20.in-addr.arpa udp

Files

memory/1020-1-0x0000000002C80000-0x0000000002D80000-memory.dmp

memory/1020-2-0x0000000004900000-0x0000000004946000-memory.dmp

memory/1020-3-0x0000000000400000-0x0000000000449000-memory.dmp

memory/1020-4-0x0000000004DF0000-0x0000000004E2C000-memory.dmp

memory/1020-5-0x0000000007410000-0x00000000079B4000-memory.dmp

memory/1020-6-0x00000000072D0000-0x000000000730A000-memory.dmp

memory/1020-87-0x0000000000400000-0x0000000002BC9000-memory.dmp

memory/1020-70-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-68-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-66-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-64-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-62-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-60-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-58-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-54-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-52-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-50-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-48-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-46-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-44-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-40-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-38-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-36-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-34-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-32-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-30-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-28-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-24-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-22-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-20-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-18-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-16-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-14-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-12-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-8-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-7-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-56-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-42-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-26-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-10-0x00000000072D0000-0x0000000007305000-memory.dmp

memory/1020-800-0x0000000009E40000-0x000000000A458000-memory.dmp

memory/1020-801-0x000000000A480000-0x000000000A492000-memory.dmp

memory/1020-802-0x000000000A4A0000-0x000000000A5AA000-memory.dmp

memory/1020-803-0x000000000A5D0000-0x000000000A60C000-memory.dmp

memory/1020-804-0x0000000004BE0000-0x0000000004C2C000-memory.dmp

memory/1020-805-0x0000000002C80000-0x0000000002D80000-memory.dmp

memory/1020-807-0x0000000004900000-0x0000000004946000-memory.dmp

memory/1020-808-0x0000000000400000-0x0000000000449000-memory.dmp