top title background image
flash

GJXZRPhgm4.exe

Status: finished
Submission Time: 2021-12-31 19:11:06 +01:00
Malicious
Trojan
Spyware
Evader
RedLine SmokeLoader Tofsee Vidar

Comments

Tags

  • exe
  • RedLineStealer

Details

  • Analysis ID:
    546825
  • API (Web) ID:
    914347
  • Analysis Started:
    2021-12-31 19:11:06 +01:00
  • Analysis Finished:
    2021-12-31 19:26:01 +01:00
  • MD5:
    4eb8aaa41fc2ef6fdc3432cc47c09c66
  • SHA1:
    6aa99adf337e5db142aa3a75c416bad6e8f7a2ed
  • SHA256:
    8cedc3fb74185394bbf60d2dc1f9618b1e576986f13031b9e29ef12daa6eaf2c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 8/93
malicious

IPs

IP Country Detection
188.166.28.199
Netherlands
86.107.197.138
Romania
185.233.81.115
Russian Federation
Click to see the 11 hidden entries
185.7.214.171
France
185.186.142.166
Russian Federation
172.67.158.215
United States
54.38.220.85
France
162.159.133.233
United States
91.243.44.128
Russian Federation
144.76.136.153
Germany
31.28.27.130
Russian Federation
164.132.207.80
France
67.199.248.14
United States
67.199.248.10
United States

Domains

Name IP Detection
unicupload.top
54.38.220.85
dodecoin.org
164.132.207.80
host-data-coin-11.com
31.28.27.130
Click to see the 9 hidden entries
bit.ly
67.199.248.10
bitly.com
67.199.248.14
t.me
149.154.167.99
cdn.discordapp.com
162.159.133.233
transfer.sh
144.76.136.153
privacytools-foryou-777.com
31.28.27.130
file-file-host4.com
31.28.27.130
short.link
172.67.158.215
data-host-coin-8.com
31.28.27.130

URLs

Name Detection
pa:443
http://185.7.214.171:8080/6.php
http://data-host-coin-8.com/game.exe
Click to see the 97 hidden entries
http://privacytools-foryou-777.com/downloads/toolspab3.exe
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
http://tempuri.org/Entity/Id13Response
https://support.google.com/chrome/?p=plugin_divx
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
http://schemas.xmlsoap.org/ws/2004/06/addressingex
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
https://support.google.com/chrome/?p=plugin_java
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
https://cdn.discordapp.com/attachments/916319571638620172/925647741571452938/Pyroxylic.exe
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://support.google.com/chrome/?p=plugin_wmp
http://tempuri.org/Entity/Id8Response
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
http://tempuri.org/Entity/Id18Response
http://schemas.xmlsoap.org/ws/2005/02/sc
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
https://get.adob
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
https://www.tiktok.com/legal/report/feedback
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://file-file-host4.com/sqlite3.dll
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
http://schemas.xmlsoap.org/ws/2002/12/policy
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
https://dev.ditu.live.com/REST/v1/Transit/Stops/
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://tempuri.org/Entity/Id15Response
https://bit.ly/3eHgQQR
http://schemas.xmlsoap.org/ws/2004/10/wsat
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
http://file-file-host4.com/tratata.php:
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
https://support.google.com/chrome/?p=plugin_real
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
http://tempuri.org/Entity/Id21Response
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
http://tempuri.org/Entity/Id2Response
http://tempuri.org/
https://dodecoin.org/dogewallet-setup.exe
http://tempuri.org/Entity/Id12Response
https://duckduckgo.com/ac/?q=
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
https://duckduckgo.com/chrome_newtab
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
http://schemas.xmlsoap.org/ws/2004/08/addressing
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
https://transfer.sh/%28/8V4TRR/q.exe%29.zip
http://tempuri.org/Entity/Id5Response
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
http://filile-file-host4.com/tratata.php
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://support.google.com/chrome/?p=plugin_shockwave
https://dynamic.t
http://tempuri.org/Entity/Id10Response
http://data-host-coin-8.com/files/5376_1640094939_1074.exe
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
http://tempuri.org/Entity/Id24Response
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
http://crl.ver)
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
https://api.ip.sb/ip
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\B074.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\B7EC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\aafjaea:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 17 hidden entries
C:\Users\user\AppData\Local\Temp\C376.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\CF8D.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\aafjaea
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\D80A.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ackjzztq.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Windows\SysWOW64\ecrnzymb\ackjzztq.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220101_031200_065.etl
data
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\W4WB1DBI
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\S0HVS2V3
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\G4WBIWT2
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\D1AA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\C209.exe
MS-DOS executable
#
C:\Users\user\AppData\Local\Temp\89R1NGVK
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\sqlite3[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\D80A.exe.log
ASCII text, with CRLF line terminators
#