Windows
Analysis Report
17300326279186e286d8011f3b538be5fe09fea96cf622736b029b36a16f125b2e18b135f5130.dat-decoded.exe
Overview
General Information
Sample name: | 17300326279186e286d8011f3b538be5fe09fea96cf622736b029b36a16f125b2e18b135f5130.dat-decoded.exe |
Analysis ID: | 1543228 |
MD5: | f4ee3982121972780a4666680cf24fa5 |
SHA1: | a894dfc5474469226cef8f660f9f4a2b0e4b0cd5 |
SHA256: | 60e3c682298d5a701939cf96defd2329d1fbb2dfb1209496a05058eb669ed983 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
{"C2 url": "185.216.71.25:31668", "Authorization Header": "5e2f20f6ca9c091fa0ae9c44b7109e34"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: |
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Timestomp | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543228 |
Start date and time: | 2024-10-27 13:38:23 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 17300326279186e286d8011f3b538be5fe09fea96cf622736b029b36a16f125b2e18b135f5130.dat-decoded.exe |
Detection: | MAL |
Classification: | mal64.troj.winEXE@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse as no analysis process or sample was found
- Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
- Exclude process from analysis (whitelisted): dllhost.exe
- VT rate limit hit for: 17300326279186e286d8011f3b538be5fe09fea96cf622736b029b36a16f125b2e18b135f5130.dat-decoded.exe
File type: | |
Entropy (8bit): | 5.134644859825707 |
TrID: |
|
File name: | 17300326279186e286d8011f3b538be5fe09fea96cf622736b029b36a16f125b2e18b135f5130.dat-decoded.exe |
File size: | 316'507 bytes |
MD5: | f4ee3982121972780a4666680cf24fa5 |
SHA1: | a894dfc5474469226cef8f660f9f4a2b0e4b0cd5 |
SHA256: | 60e3c682298d5a701939cf96defd2329d1fbb2dfb1209496a05058eb669ed983 |
SHA512: | d16c69d970398a65459e8a44cdd27c1583c9140482219445bae431294e889eafea2a97ef649a5d3676379eac4e491d0ec5d1b71609ff109b43f804ad3732dff5 |
SSDEEP: | 3072:tfqmE2yeulMshynYVRcwPjD3z3vVM7FAQtANK9hGJ9WwN26HxBOwcshg:tSqyeulMlwPnrVM7FAMAIYJ9WwN2s7 |
TLSH: | 9E646C1923DC9512E27F4B399471E630E774EC56A552E30E8EC46DAB3D33740FA24AB2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Y................0.................. ... ....@.. ....................... ............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x42b9aa |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x811F5984 [Wed Aug 25 02:16:36 2038 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
jne 00007F85CCC11AD4h |
arpl word ptr [ebp+52h], sp |
popad |
jc 00007F85CCC11A90h |
and byte ptr [ebp+73h], ch |
arpl word ptr [edi+72h], bp |
insb |
imul esp, dword ptr [edx+2Ch], 72655620h |
jnc 00007F85CCC11ACBh |
outsd |
outsb |
cmp eax, 2E302E34h |
xor byte ptr [esi], ch |
xor byte ptr [eax], ch |
inc ebx |
jne 00007F85CCC11ACEh |
je 00007F85CCC11AD7h |
jc 00007F85CCC11AC7h |
cmp eax, 7475656Eh |
jc 00007F85CCC11AC3h |
insb |
sub al, 20h |
push eax |
jne 00007F85CCC11AC4h |
insb |
imul esp, dword ptr [ebx+4Bh], 6F547965h |
imul esp, dword ptr [ebp+6Eh], 3Dh |
bound esi, dword ptr [edi] |
aaa |
popad |
xor eax, 31363563h |
cmp dword ptr [ebx], esi |
xor al, 65h |
xor byte ptr [eax], bh |
cmp dword ptr [ebx], esp |
push ebx |
jns 00007F85CCC11AD5h |
je 00007F85CCC11AC7h |
insd |
push edx |
jnc 00007F85CCC11AD2h |
jne 00007F85CCC11AD4h |
arpl word ptr [ebp+73h], sp |
push edx |
jne 00007F85CCC11AD0h |
je 00007F85CCC11ACBh |
insd |
push edx |
jnc 00007F85CCC11AD2h |
jne 00007F85CCC11AD4h |
arpl word ptr [ebp+53h], sp |
je 00007F85CCC11A65h |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax+41h], dl |
inc esp |
push eax |
inc ecx |
inc esp |
push eax |
and edi, dword ptr [ebx+00004512h] |
add byte ptr [eax], al |
rol dword ptr [eax], 1 |
add byte ptr [eax], al |
adc byte ptr [edx+00h], dh |
outsd |
add byte ptr [edi+00h], ch |
je 00007F85CCC11A62h |
inc ebx |
add byte ptr [ebp+00h], ah |
jc 00007F85CCC11A62h |
je 00007F85CCC11A62h |
add byte ptr [eax], al |
add byte ptr [eax], al |
and byte ptr [esi+0Ah], ah |
add byte ptr [eax], al |
xor byte ptr [edx+0102620Ah], al |
add esi, dword ptr [eax] |
or byte ptr [edx], 00000022h |
push es |
or dword ptr [edx], ebp |
xchg byte ptr [eax-7Ah], cl |
test dword ptr [00000001h], 00000000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2b958 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x32000 | 0x1c9d4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x50000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x2b93c | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x2e990 | 0x2ec00 | be6a556924c778c70405164e8711c4f4 | False | 0.4665148729946524 | PGP symmetric key encrypted data - Plaintext or unencrypted data | 6.227108145078575 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x32000 | 0x1c9d4 | 0x1cc00 | af6de25f57b879ce5b6b40abf31fc7f5 | False | 0.25185122282608696 | data | 2.8128416080839806 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x50000 | 0xc | 0x400 | f3ca581eecbaa7ffaccf2413a3235455 | False | 0.3466796875 | data | 1.8046830608488853 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |