Click to jump to signature section
Source: 12.0.file.exe.400000.0.unpack | Malware Configuration Extractor: RedLine {"C2 url": ["195.54.170.157:16525"], "Bot Id": "1289804401", "Authorization Header": "139c242025d9881024ce5bc26de4c39f"} |
Source: file.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: file.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: msvcp100.i386.pdb source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp |
Source: | Binary string: \Analyze\AnalyzeData_win32_Release\AnalyzeData.pdb source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp |
Source: | Binary string: msvcp120.i386.pdb source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp |
Source: | Binary string: \Analyze\AnalyzeData_win32_Release\AnalyzeData.pdbn source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp |
Source: Traffic | Snort IDS: 2850027 ETPRO TROJAN RedLine Stealer TCP CnC net.tcp Init 192.168.11.20:49813 -> 195.54.170.157:16525 |
Source: Traffic | Snort IDS: 2850286 ETPRO TROJAN Redline Stealer TCP CnC Activity 192.168.11.20:49813 -> 195.54.170.157:16525 |
Source: Traffic | Snort IDS: 2850353 ETPRO MALWARE Redline Stealer TCP CnC - Id1Response 195.54.170.157:16525 -> 192.168.11.20:49813 |
Source: Yara match | File source: 12.0.file.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Joe Sandbox View | ASN Name: VALICOM-ASPT VALICOM-ASPT |
Source: Joe Sandbox View | IP Address: 195.54.170.157 195.54.170.157 |
Source: global traffic | TCP traffic: 192.168.11.20:49813 -> 195.54.170.157:16525 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: 12.0.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 12.0.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0000000C.00000000.151021654989.0000000000402000.00000004.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: file.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 12.0.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 12.0.file.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0000000C.00000000.151021654989.0000000000402000.00000004.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: C:\Users\user\Desktop\file.exe | Code function: 12_2_0117F8C8 | 12_2_0117F8C8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 12_2_015D2F70 | 12_2_015D2F70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 12_2_015D86C0 | 12_2_015D86C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 12_2_015D5048 | 12_2_015D5048 |
Source: C:\Users\user\Desktop\file.exe | Process Stats: CPU usage > 98% |
Source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameAnalyzeData.dll vs file.exe |
Source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamemsvcp100.dll^ vs file.exe |
Source: file.exe, 00000002.00000000.149816400827.0000000000DA6000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamemsvcp120.dll^ vs file.exe |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: file.exe | Static PE information: invalid certificate |
Source: file.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\file.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2781761E-28E0-4109-99FE-B9D127C57AFE}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1' |
Source: C:\Users\user\Desktop\file.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\file.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log | Jump to behavior |
Source: classification engine | Classification label: mal96.troj.spyw.evad.winEXE@5/1@0/1 |
Source: file.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.91% | |
Source: C:\Users\user\Desktop\file.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll | Jump to behavior |
Source: 12.0.file.exe.400000.0.unpack, BrEx.cs | Base64 encoded string: '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 |