Windows
Analysis Report
1742779744db24e1ffc5992156b451594c630d6727655b5a1fdf9aa26be2bd711053e4f4ba103.dat-decoded.exe
Overview
General Information
Sample name: | 1742779744db24e1ffc5992156b451594c630d6727655b5a1fdf9aa26be2bd711053e4f4ba103.dat-decoded.exe |
Analysis ID: | 1646452 |
MD5: | cea87fcb4cb28b8717fa57ce174baf89 |
SHA1: | 1704af30ae986f403ba3b9cfefe56cc2e9021320 |
SHA256: | b8aedabe16b7d21a53e6168e3ebf2e522927983bc7118f14514653455ba8fb55 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Detection
Score: | 64 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
MALWARE_Win_Arechclient2 | Detects Arechclient2 RAT | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Static PE information: |
System Summary |
---|
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Static PE information: |
Source: | Static PE information: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Software Packing | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Obfuscated Files or Information | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
22% | ReversingLabs | |||
27% | Virustotal | Browse |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1646452 |
Start date and time: | 2025-03-24 02:46:16 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1742779744db24e1ffc5992156b451594c630d6727655b5a1fdf9aa26be2bd711053e4f4ba103.dat-decoded.exe |
Detection: | MAL |
Classification: | mal64.troj.winEXE@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse
as no analysis process or sam ple was found - Corrupt sample or wrongly sele
cted analyzer. Details: %1 is not a valid Win32 application.
- Exclude process from analysis
(whitelisted): dllhost.exe, Sg rmBroker.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 184.31.69.3 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om
File type: | |
Entropy (8bit): | 6.862408863716844 |
TrID: |
|
File name: | 1742779744db24e1ffc5992156b451594c630d6727655b5a1fdf9aa26be2bd711053e4f4ba103.dat-decoded.exe |
File size: | 874'934 bytes |
MD5: | cea87fcb4cb28b8717fa57ce174baf89 |
SHA1: | 1704af30ae986f403ba3b9cfefe56cc2e9021320 |
SHA256: | b8aedabe16b7d21a53e6168e3ebf2e522927983bc7118f14514653455ba8fb55 |
SHA512: | 7dc7d9a7533cea14ff8beb3a394c61983e7bceaaa158c71c9f1b6449cdb6a0bc2a1a528fbfd59f7daeaf6e1d2bdf46c62f1f0a70f6ff20b59f5d9f485d691e6d |
SSDEEP: | 12288:Z3J1Kkyfg+sxNJXMHPvqsE79SrAeWNmTs3O0ixOzh2tIA37d89j:xKNgXePXrA209Mt9S |
TLSH: | 97155AED3F039E23C9E8677A88EF2C05A2A12697DD40796DC96C94C05E9134DB7D9EC0 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....f.g............................>.... ........@.. .......................@............................................. |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4cee3e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x67D166AD [Wed Mar 12 10:49:17 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
jo 00007F9C68B02292h |
dec ecx |
push eax |
inc edi |
insb |
outsd |
bound esp, dword ptr [ecx+6Ch] |
push eax |
jc 00007F9C68B02301h |
jo 00007F9C68B022F7h |
jc 00007F9C68B02306h |
imul esp, dword ptr [ebp+73h], 74654700h |
dec ecx |
push eax |
inc edi |
insb |
outsd |
bound esp, dword ptr [ecx+6Ch] |
push eax |
jc 00007F9C68B02301h |
jo 00007F9C68B022F7h |
jc 00007F9C68B02306h |
imul esp, dword ptr [ebp+73h], 426F5400h |
jns 00007F9C68B02306h |
add byte ptr [edi+65h], ah |
je 00007F9C68B022F1h |
inc esp |
popa |
jne 00007F9C68B022FEh |
je 00007F9C68B02292h |
inc ebx |
popad |
jo 00007F9C68B02306h |
jne 00007F9C68B02304h |
add byte ptr [edi+65h], ah |
je 00007F9C68B022F1h |
push esi |
popad |
insb |
jne 00007F9C68B022F7h |
add byte ptr [edx+61h], dl |
outsb |
outsd |
insd |
dec esi |
jne 00007F9C68B022FFh |
bound esp, dword ptr [ebp+72h] |
inc edi |
outsb |
jc 00007F9C68B022F4h |
je 00007F9C68B02301h |
jc 00007F9C68B02292h |
inc ecx |
jnc 00007F9C68B02293h |
dec ecx |
jnc 00007F9C68B022DEh |
je 00007F9C68B02307h |
jc 00007F9C68B022E2h |
jc 00007F9C68B022D6h |
imul esp, dword ptr [edi+69h], 65670074h |
je 00007F9C68B022F1h |
inc ebx |
insb |
imul esp, dword ptr [ebp+6Eh], 65730074h |
je 00007F9C68B022F1h |
push edx |
arpl word ptr [ebp+69h], sp |
jbe 00007F9C68B022F7h |
inc edx |
jne 00007F9C68B022F8h |
jc 000022E7h |
imul edi, dword ptr [edx+65h], 74657300h |
pop edi |
push ebx |
outsb |
inc edx |
jne 00007F9C68B022F8h |
jc 000022E7h |
imul edi, dword ptr [edx+65h], 74656700h |
pop edi |
push ebx |
outsd |
arpl word ptr [ebx+65h], bp |
je 00007F9C68B022D7h |
jc 00007F9C68B02304h |
outsd |
jc 00007F9C68B02292h |
push ebx |
outsd |
arpl word ptr [ebx+65h], bp |
je 00007F9C68B022D7h |
jc 00007F9C68B02304h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcede4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xd0000 | 0x600 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xd2000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xcce44 | 0xcd000 | 5e70700af2340f2f07c26df36cbc9a5d | False | 0.5564750857469513 | data | 6.863036007404867 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xd0000 | 0x600 | 0x600 | 8e7c1e49b10e6605e1b3e718992e49a3 | False | 0.56640625 | data | 4.846053308928435 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xd2000 | 0xc | 0x200 | e5995c98c94dc4abac14e19059f89196 | False | 0.587890625 | data | 4.665568559516476 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |