Windows Analysis Report
17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe

Overview

General Information

Sample name: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe
Analysis ID: 1525920
MD5: 4393cbc50829141693cd64dc0f4f719b
SHA1: 1e4dae2433990e66dc546d784bcbe667fec2d301
SHA256: bb06a034c7f5fb46cd46ef66d0345e03047ab90fb0022ac534cc2f00baaed2b6
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

RedLine
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Binary contains a suspicious time stamp
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer

AV Detection

barindex
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Malware Configuration Extractor: RedLine {"C2 url": "38.180.201.126:26704", "Authorization Header": "fb6061fa1eeb8bab0b273aba0ac9b37c"}
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe ReversingLabs: Detection: 23%
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Joe Sandbox ML: detected
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Networking

barindex
Source: Malware configuration extractor URLs: 38.180.201.126:26704
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe String found in binary or memory: https://api.ip.sb/ip
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Binary or memory string: OriginalFilenameSidles.exe8 vs 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal72.troj.winEXE@0/0@0/0
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe ReversingLabs: Detection: 23%
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe Static PE information: 0xCD9B55B3 [Sun Apr 23 21:01:39 2079 UTC]

Stealing of Sensitive Information

barindex
Source: Yara match File source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: 17280510295d7109f6b4118c41d4d952ad5b61d1331dfe446cbcc51e967258660f74609d1c867.dat-decoded.exe, type: SAMPLE
No contacted IP infos