top title background image
flash

sbxGIUIhRd.exe

Status: finished
Submission Time: 2022-01-14 12:27:37 +01:00
Malicious
Trojan
Spyware
Evader
Amadey Raccoon RedLine SmokeLoader Tofse

Comments

Tags

  • exe
  • RedLineStealer

Details

  • Analysis ID:
    553170
  • API (Web) ID:
    920692
  • Analysis Started:
    2022-01-14 12:27:37 +01:00
  • Analysis Finished:
    2022-01-14 12:46:29 +01:00
  • MD5:
    f768f4a81e8b87d6990895a35b8d7d6c
  • SHA1:
    d0e5c1e975ec41e222f99f7a235d85317a1be3a7
  • SHA256:
    164149035d4a3d2edba76c0601f6f83e04d45d7c057d221130c57fc9b13fd5b5
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 24/66
malicious
Score: 12/35
malicious
Score: 33/43
malicious
malicious

IPs

IP Country Detection
185.163.204.24
Germany
185.215.113.35
Portugal
188.166.28.199
Netherlands
Click to see the 14 hidden entries
185.186.142.166
Russian Federation
185.7.214.171
France
185.233.81.115
Russian Federation
81.163.30.181
Russian Federation
162.159.135.233
United States
185.163.204.22
Germany
144.76.136.153
Germany
104.47.54.36
United States
185.163.45.70
Moldova Republic of
54.38.220.85
France
8.209.70.0
Singapore
86.107.197.138
Romania
172.67.139.105
United States
94.142.143.116
Russian Federation

Domains

Name IP Detection
pool-fr.supportxmr.com
149.202.83.171
unicupload.top
54.38.220.85
host-data-coin-11.com
8.209.70.0
Click to see the 8 hidden entries
patmushta.info
94.142.143.116
cdn.discordapp.com
162.159.135.233
privacy-tools-for-you-780.com
8.209.70.0
microsoft-com.mail.protection.outlook.com
104.47.54.36
goo.su
172.67.139.105
transfer.sh
144.76.136.153
data-host-coin-8.com
8.209.70.0
pool.supportxmr.com
0.0.0.0

URLs

Name Detection
http://185.163.204.24//l/f/S2zKVH4BZ2GIX1a3NFPE/cae3f8ed633c3e67f112fa91bf9f9a15abbe2944
http://81.163.30.181/1.exe
http://data-host-coin-8.com/files/9030_1641816409_7037.exe
Click to see the 97 hidden entries
http://185.163.204.24/
http://185.215.113.35/d2VxjasuwS/plugins/cred.dll
http://185.215.113.35/d2VxjasuwS/index.php?scr=1
http://data-host-coin-8.com/files/6961_1642089187_2359.exe
http://185.215.113.35/d2VxjasuwS/index.php
http://185.7.214.171:8080/6.php
http://schemas.xmlsoap.org/ws/2004/06/addressingex
http://schemas.xmlsoap.org/ws/2002/12/policy
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
http://tempuri.org/Entity/Id13Response
https://support.google.com/chrome/?p=plugin_divx
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
http://data-host-coin-8.com/game.exe
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
http://tempuri.org/Entity/Id8
http://tempuri.org/Entity/Id9
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
http://service.r
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://schemas.xmlsoap.org/soap/actor/next
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
http://schemas.xmlsoap.org/ws/2005/02/rm
http://tempuri.org/Entity/Id3Response
https://disneyplus.com/legal.
http://tempuri.org/Entity/Id22Response
http://service.real.com/realplayer/security/02062012_player/en/
http://tempuri.org/Entity/Id18Response
http://schemas.xmlsoap.org/ws/2005/02/sc
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
https://get.adob
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
https://www.tiktok.com/legal/report/feedback
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://tempuri.org/Entity/Id15Response
http://schemas.xmlsoap.org/ws/2004/10/wsat
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
https://support.google.com/chrome/?p=plugin_real
https://api.ip.sb/ip
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
http://tempuri.org/Entity/Id21Response
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
http://tempuri.org/Entity/Id2Response
http://tempuri.org/
http://tempuri.org/Entity/Id12Response
https://duckduckgo.com/ac/?q=
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
https://duckduckgo.com/chrome_newtab
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
http://tempuri.org/Entity/Id5Response
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
https://support.google.com/chrome/?p=plugin_wmp
http://tempuri.org/Entity/Id8Response
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
http://tempuri.org/Entity/Id10Response
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
https://support.google.com/chrome/?p=plugin_java
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
https://support.google.com/chrome/?p=plugin_shockwave
http://schemas.xmlsoap.org/ws/2004/08/addressing
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
http://tempuri.org/Entity/Id24Response
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\96DB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\gaystiqf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\FA5C.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 23 hidden entries
C:\Users\user\AppData\Local\Temp\E2A6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\CFE8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\CF17.exe
PE32 executable (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\C487.exe
MS-DOS executable
#
C:\Users\user\AppData\Local\Temp\BBBC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\B3EB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\A15C.exe
PE32 executable (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\95C6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\8A6B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\7D38.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\adijaeg
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\adijaeg:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Windows\SysWOW64\txlhcyih\gaystiqf.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
#
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_8A6B.exe_27f61c19393a91a6721bfcdfd39195a1563f_168ad717_1a666159\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FA5C.exe.log
ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC913.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC559.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF7C.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jan 14 11:29:26 2022, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5A6.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E61.tmp.csv
data
#