top title background image
flash

0Cjy7Lkv1A.exe

Status: finished
Submission Time: 2022-01-13 23:27:21 +01:00
Malicious
Trojan
Spyware
Evader
Amadey Raccoon RedLine SmokeLoader Tofse

Comments

Tags

  • exe
  • RedLineStealer

Details

  • Analysis ID:
    552945
  • API (Web) ID:
    920471
  • Analysis Started:
    2022-01-13 23:27:23 +01:00
  • Analysis Finished:
    2022-01-13 23:46:11 +01:00
  • MD5:
    eb023c854d3c8a24589e9294fd5d346e
  • SHA1:
    699eb8e25fcd583774381b9ff554c7e8442c8c43
  • SHA256:
    b602afd3f94c5820291f8319b23f20e5254212ba6aab49be0238d7067caca7b8
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 26/69
malicious
Score: 16/35
malicious
Score: 22/27
malicious
malicious

IPs

IP Country Detection
188.166.28.199
Netherlands
185.233.81.115
Russian Federation
185.7.214.171
France
Click to see the 12 hidden entries
185.186.142.166
Russian Federation
185.163.45.70
Moldova Republic of
54.38.220.85
France
104.47.54.36
United States
104.21.38.221
United States
93.189.42.167
Russian Federation
144.76.136.153
Germany
8.209.67.104
Singapore
141.8.194.74
Russian Federation
185.163.204.22
Germany
185.163.204.24
Germany
162.159.134.233
United States

Domains

Name IP Detection
s3-w.us-east-1.amazonaws.com
54.231.194.41
bitbucket.org
104.192.141.1
pool-fr.supportxmr.com
149.202.83.171
Click to see the 11 hidden entries
unicupload.top
54.38.220.85
host-data-coin-11.com
93.189.42.167
patmushta.info
8.209.67.104
cdn.discordapp.com
162.159.134.233
microsoft-com.mail.protection.outlook.com
104.47.54.36
goo.su
104.21.38.221
transfer.sh
144.76.136.153
a0621298.xsph.ru
141.8.194.74
data-host-coin-8.com
93.189.42.167
bbuseruploads.s3.amazonaws.com
0.0.0.0
pool.supportxmr.com
0.0.0.0

URLs

Name Detection
http://185.7.214.171:8080/6.php
http://data-host-coin-8.com/files/9030_1641816409_7037.exe
http://data-host-coin-8.com/game.exe
Click to see the 97 hidden entries
http://a0621298.xsph.ru/File.exe
http://a0621298.xsph.ru/443.exe
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
http://tempuri.org/Entity/Id13Response
https://www.tiktok.com/legal/report
https://support.google.com/chrome/?p=plugin_divx
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
http://a0621298.xsph.ru/45512.exe
http://schemas.xmlsoap.org/ws/2004/06/addressingex
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
https://support.google.com/chrome/?p=plugin_java
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://schemas.xmlsoap.org/soap/actor/next
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
http://schemas.xmlsoap.org/ws/2005/02/rm
http://tempuri.org/Entity/Id3Response
https://disneyplus.com/legal.
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
http://service.real.com/realplayer/security/02062012_player/en/
http://tempuri.org/Entity/Id18Response
http://schemas.xmlsoap.org/ws/2005/02/sc
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
https://get.adob
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
https://www.tiktok.com/legal/report/feedback
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://tempuri.org/Entity/Id22Response
http://schemas.xmlsoap.org/ws/2002/12/policy
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
https://support.google.com/chrome/?p=plugin_wmp
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://185.163.204.24//l/f/N2z-VH4BZ2GIX1a33Fax/e946ea03b0a56043b0189e637403106a5b3aad8e
http://tempuri.org/Entity/Id15Response
http://schemas.xmlsoap.org/ws/2004/10/wsat
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
http://185.163.204.24//l/f/N2z-VH4BZ2GIX1a33Fax/4457553c06dee2e98e4f451cad0abfa16d7760a4
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
http://a0621298.xsph.ru/advert.msi
http://185.163.204.24/
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
https://support.google.com/chrome/?p=plugin_real
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
http://tempuri.org/Entity/Id21Response
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
http://tempuri.org/Entity/Id2Response
http://tempuri.org/
http://tempuri.org/Entity/Id12Response
https://duckduckgo.com/ac/?q=
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
https://duckduckgo.com/chrome_newtab
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
http://a0621298.xsph.ru/9.exe
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
http://tempuri.org/Entity/Id8Response
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
http://tempuri.org/Entity/Id10Response
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
http://tempuri.org/Entity/Id5Response
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
https://support.google.com/chrome/?p=plugin_shockwave
http://schemas.xmlsoap.org/ws/2004/08/addressing
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
http://tempuri.org/Entity/Id24Response
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
http://crl.ver)
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
https://api.ip.sb/ip
http://www.autoitscript.com/autoit3/J
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\A8FB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\9874.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\8B25.exe
MS-DOS executable
#
Click to see the 28 hidden entries
C:\Users\user\AppData\Local\Temp\8008.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\7063.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\6674.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\60C2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\5126.exe
PE32 executable (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\382E.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\1BCC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\B3BA.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\B3BA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\szdcdkt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\ujhcrda
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\ujhcrda:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Windows\SysWOW64\uuqefjyt\szdcdkt.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
#
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D84.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER48A1.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44E.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4237.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jan 14 07:29:24 2022, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C4C.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AD2.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27C7.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_60C2.exe_b994e4a82aa011c06f96cb901a89f64e833a6a1c_f737e9d6_0beefd4a\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0x81ef5937, page size 16384, DirtyShutdown, Windows version 10.0
#