top title background image
flash

cz2ZyeL2Zd.exe

Status: finished
Submission Time: 2022-01-09 18:46:09 +01:00
Malicious
Trojan
Spyware
Evader
RedLine SmokeLoader Tofsee Vidar

Comments

Tags

  • exe
  • RedLineStealer

Details

  • Analysis ID:
    549822
  • API (Web) ID:
    917344
  • Analysis Started:
    2022-01-09 18:46:09 +01:00
  • Analysis Finished:
    2022-01-09 18:59:50 +01:00
  • MD5:
    246b41453b996bfa14f60d4785e598ac
  • SHA1:
    977b7d8cc4237ca4c8a2268aedfff4d83c7d0a86
  • SHA256:
    08a6dfeb7adf5eb90703abfab6c1f24a9f93c79e6287213f695c44f0181644ec
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 23/68
malicious
Score: 17/35
malicious
Score: 27/28
malicious
malicious

IPs

IP Country Detection
54.38.220.85
France
211.169.6.249
Korea Republic of
185.233.81.115
Russian Federation
Click to see the 11 hidden entries
47.251.44.201
United States
185.186.142.166
Russian Federation
188.166.28.199
Netherlands
148.0.74.229
Dominican Republic
175.126.109.15
Korea Republic of
162.159.130.233
United States
185.7.214.171
France
211.119.84.112
Korea Republic of
67.199.248.14
United States
187.232.210.249
Mexico
67.199.248.10
United States

Domains

Name IP Detection
unicupload.top
54.38.220.85
amogohuigotuli.at
211.169.6.249
host-data-coin-11.com
47.251.44.201
Click to see the 8 hidden entries
privacytools-foryou-777.com
47.251.44.201
data-host-coin-8.com
47.251.44.201
unic11m.top
54.38.220.85
srtuiyhuali.at
0.0.0.0
fufuiloirtu.com
0.0.0.0
bit.ly
67.199.248.10
bitly.com
67.199.248.14
cdn.discordapp.com
162.159.130.233

URLs

Name Detection
http://host-data-coin-11.com/
https://185.233.81.115/32739433.dat?iddqd=1
http://data-host-coin-8.com/game.exe
Click to see the 64 hidden entries
http://unicupload.top/install5.exe
http://data-host-coin-8.com/files/2184_1641247228_8717.exe
http://unic11m.top/install1.exe
http://unicupload.top/install1.exe
http://privacytools-foryou-777.com/downloads/toolspab1.exe
http://185.7.214.171:8080/6.php
http://file-file-host4.com/tratata.php
parubey.info:443
http://data-host-coin-8.com/files/9993_1641737702_2517.exe
pa:443
http://file-coin-host-12.com/
https://%s.xboxlive.com
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
https://dev.virtualearth.net/REST/v1/Locations
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
http://schemas.micr
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://www.tiktok.com/legal/report/feedback
https://dev.virtualearth.net/REST/v1/Routes/
https://t0.ssl.ak.tiles.
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
https://www.disneyplus.com/legal/privacy-policy
https://dynamic.t
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://disneyplus.com/legal.
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://activity.windows.com
https://dev.ditu.live.com/REST/v1/Locations
http://help.disneyplus.com.
https://%s.dnet.xboxlive.com
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
http://ocsp.sectigo.com0
https://dev.ditu.live.com/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
http://amogohuigotuli.at/
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://cdn.discordapp.com/attachments/928021103304134716/928938539171864596/Dulling.exe
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://bitly.com/a/blocked?hash=3eHgQQR&url=https%3A%2F%2Fcdn-131.anonfiles.com%2FP0m5w4j2xc%2Fcac3eb98-1640853984%2F%40Cryptobat9.exe
https://dev.ditu.live.com/mapcontrol/logging.ashx
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
http://crl.ver)
https://sectigo.com/CPS0D
https://bit.ly/3eHgQQR
http://www.bingmapsportal.com
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
https://www.disneyplus.com/legal/your-california-privacy-rights
https://api.ip.sb/ip
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://dev.ditu.live.com/REST/v1/Transit/Stops/
http://schemas.mi
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
http://data-host-coin-8.com/files/2150_1641729871_1812.exe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\rljdetbq.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\1F0B.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\2B8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 22 hidden entries
C:\Users\user\AppData\Local\Temp\5D68.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\8FB8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\icgujuh:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\AEFA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\icgujuh
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\BFF4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\ecgujuh
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\EC9F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl.0001.. (copy)
data
#
C:\Users\user\AppData\Local\Temp\D830.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\aiecibh
data
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220110_024703_630.etl
data
#
C:\Windows\SysWOW64\rhrovez\rljdetbq.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl.0001 (copy)
data
#
C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl.0001@` (copy)
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1F0B.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\B729.exe
MS-DOS executable
#
C:\Users\user\AppData\Local\Temp\97B8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
data
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
data
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
data
#