Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe

Overview

General Information

Sample name:1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
Analysis ID:1525931
MD5:1c15ef7c7cc9c639bb5d911bda8f56f9
SHA1:4ec9b1c573dcc6e7ee3be0dd528862362bf22aee
SHA256:63df8a83fd602a1aa3427360fabd005d16d44e05b8493436c30d950a00546c5d
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

RedLine
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Binary contains a suspicious time stamp
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "193.143.1.177:31143", "Bot Id": "@fortnite-0.0.1", "Authorization Header": "23fc4d9ae230b3899e77276f1497cc23"}
SourceRuleDescriptionAuthorStrings
1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeMalware Configuration Extractor: RedLine {"C2 url": "193.143.1.177:31143", "Bot Id": "@fortnite-0.0.1", "Authorization Header": "23fc4d9ae230b3899e77276f1497cc23"}
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeReversingLabs: Detection: 28%
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeJoe Sandbox ML: detected
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: 193.143.1.177:31143
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeString found in binary or memory: https://api.ip.sb/ip
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeBinary or memory string: OriginalFilenameBacilli.exe8 vs 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.winEXE@0/0@0/0
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeReversingLabs: Detection: 28%
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exeStatic PE information: 0xB99A3BAD [Mon Sep 3 10:13:01 2068 UTC]

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    Timestomp
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe29%ReversingLabsWin32.Ransomware.RedLine
    1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://api.ip.sb/ip0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    193.143.1.177:31143true
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.ip.sb/ip1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exefalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1525931
      Start date and time:2024-10-04 16:41:55 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 35s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:1
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
      Detection:MAL
      Classification:mal72.troj.winEXE@0/0@0/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Unable to launch sample, stop analysis
      • No process behavior to analyse as no analysis process or sample was found
      • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
      • Exclude process from analysis (whitelisted): dllhost.exe
      • VT rate limit hit for: 1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):5.1346215501738985
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Win16/32 Executable Delphi generic (2074/23) 0.01%
      • Generic Win/DOS Executable (2004/3) 0.01%
      File name:1728051009a4ae0ae46bf28ce0462d8ad260c2c97793b7053cfbd02a9681b053e2965b1674126.dat-decoded.exe
      File size:316'435 bytes
      MD5:1c15ef7c7cc9c639bb5d911bda8f56f9
      SHA1:4ec9b1c573dcc6e7ee3be0dd528862362bf22aee
      SHA256:63df8a83fd602a1aa3427360fabd005d16d44e05b8493436c30d950a00546c5d
      SHA512:10082268196a5be243537e7c86b722a1ad0a3c7d75ccbd2c1ede6e0269d4d8adbbbf1ea9f2ef644c1c58097c8ba29312b290d8ebb35ac6975720276ca86cef46
      SSDEEP:6144:jqyeulMawP12nqz3+FAxo9EXHFiFUfs7:jlwPX3lo9EXliK
      TLSH:9F646C1923DC9512E27F4B3995B1E670A774EC56E412E30E4EC46CAB3D32750FA24AB2
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;................0.................. ... ....@.. ....................... ............@................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x42b9de
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0xB99A3BAD [Mon Sep 3 10:13:01 2068 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:
      Instruction
      jns 00007F868CF19D37h
      outsd
      imul esp, dword ptr [ebp+6Eh], 3Dh
      bound esi, dword ptr [edi]
      aaa
      popad
      xor eax, 31363563h
      cmp dword ptr [ebx], esi
      xor al, 65h
      xor byte ptr [eax], bh
      cmp dword ptr [ebx], esp
      push ebx
      jns 00007F868CF19D55h
      je 00007F868CF19D47h
      insd
      push edx
      jnc 00007F868CF19D52h
      jne 00007F868CF19D54h
      arpl word ptr [ebp+73h], sp
      push edx
      jne 00007F868CF19D50h
      je 00007F868CF19D4Bh
      insd
      push edx
      jnc 00007F868CF19D52h
      jne 00007F868CF19D54h
      arpl word ptr [ebp+53h], sp
      je 00007F868CF19CE5h
      add byte ptr [eax], al
      add byte ptr [ecx], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax+41h], dl
      inc esp
      push eax
      inc ecx
      inc esp
      push eax
      and edi, dword ptr [ebx+00004512h]
      add byte ptr [eax], al
      rol dword ptr [eax], 1
      add byte ptr [eax], al
      adc byte ptr [edx+00h], dh
      outsd
      add byte ptr [edi+00h], ch
      je 00007F868CF19CE2h
      inc ebx
      add byte ptr [ebp+00h], ah
      jc 00007F868CF19CE2h
      je 00007F868CF19CE2h
      add byte ptr [eax], al
      add byte ptr [eax], al
      and byte ptr [esi+0Ah], ah
      add byte ptr [eax], al
      xor byte ptr [edx+0102620Ah], al
      add esi, dword ptr [eax]
      or byte ptr [edx], 00000022h
      push es
      or dword ptr [edx], ebp
      xchg byte ptr [eax-7Ah], cl
      test dword ptr [A0010701h], 04130A82h
      or byte ptr [edx], 0000000Fh
      xor byte ptr [edx-7DCFF4F6h], al
      push es
      or al, 06h
      or dword ptr [edx], ebp
      xchg byte ptr [eax-7Ah], cl
      test dword ptr [A0010701h], 04FD0582h
      add byte ptr [058230F9h], FFFFFFF5h
      xor byte ptr [edx+0B06F105h], al
      sub al, byte ptr [esi+0DF78648h]
      add dword ptr [edx+ecx], ecx
      add dword ptr [edx], eax
      mov al, byte ptr [30FE0482h]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x2b98c0x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x1c9c4.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x2b9700x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x2e9c40x2ec001f9b4e24e55b21bac4298e89559454b0False0.4668229862967914data6.22737325287007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x320000x1c9c40x1cc004e1dc064fb9adb850fa35f82c892027eFalse0.2517068614130435data2.8123251231982622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x500000xc0x400dfb9340dd4981469afa04a27155abb90False0.3427734375data1.7845326839435092IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      No network behavior found
      No statistics
      No system behavior
      No disassembly