Windows Analysis Report
1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe

Overview

General Information

Sample name: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
Analysis ID: 1525931
MD5: 1c15ef7c7cc9c639bb5d911bda8f56f9
SHA1: 4ec9b1c573dcc6e7ee3be0dd528862362bf22aee
SHA256: 63df8a83fd602a1aa3427360fabd005d16d44e05b8493436c30d950a00546c5d
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

RedLine
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Binary contains a suspicious time stamp
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer

AV Detection

barindex
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Malware Configuration Extractor: RedLine {"C2 url": "193.143.1.177:31143", "Bot Id": "@fortnite-0.0.1", "Authorization Header": "23fc4d9ae230b3899e77276f1497cc23"}
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe ReversingLabs: Detection: 28%
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Joe Sandbox ML: detected
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Networking

barindex
Source: Malware configuration extractor URLs: 193.143.1.177:31143
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe String found in binary or memory: https://api.ip.sb/ip
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Binary or memory string: OriginalFilenameBacilli.exe8 vs 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal72.troj.winEXE@0/0@0/0
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe ReversingLabs: Detection: 28%
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe Static PE information: 0xB99A3BAD [Mon Sep 3 10:13:01 2068 UTC]

Stealing of Sensitive Information

barindex
Source: Yara match File source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe, type: SAMPLE
No contacted IP infos