| File name: | Illyrian Stealer v4.1.zip |
| Full analysis: | https://app.any.run/tasks/7f901100-75cb-43d3-bfe5-dac64cff3480 |
| Verdict: | Malicious activity |
| Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
| Analysis date: | December 14, 2023, 20:06:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | FC923CE812AAA7DF098CEB2EA8C5A93B |
| SHA1: | 292392E8DC8700716635FADACA7A9152128D9832 |
| SHA256: | 3B250801C3B8AA03923699663D4278CA9F5F4A35C4366B8F4900AACEA1571400 |
| SSDEEP: | 98304:qHB0W0FMC+uYHyk4ln25U0MfibwbpcA5/ZfffZkjYHIX01dx0Zo/km9f8YLoggDR:DTClX4VLh3zvzR2 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2023:12:14 04:01:34 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | Illyrian Stealer v4.1/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 900 | "C:\Users\admin\Desktop\Illyrian Stealer v4.1\stub.exe" | C:\Users\admin\Desktop\Illyrian Stealer v4.1\stub.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Client Exit code: 3762504530 Version: 1.0.0.0 Modules
| |||||||||||||||
| 968 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Illyrian Stealer v4.1\README.txt | C:\Windows\System32\notepad.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1756 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | StringIds.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: MSBuild.exe Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 1864 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Illyrian Stealer v4.1.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 2068 | "C:\Users\admin\AppData\Local\Temp\startserver.exe" | C:\Users\admin\AppData\Local\Temp\startserver.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2300 | powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABTAHQAcgBpAG4AZwBJAGQAcwAuAGUAeABlADsA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2436 | "C:\Windows\System32\cmd.exe" /k START "" "C:\Users\admin\AppData\Local\Temp\startserver.exe" & EXIT | C:\Windows\System32\cmd.exe | startserver.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2460 | powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABTAHQAcgBpAG4AZwBJAGQAcwAuAGUAeABlADsA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2708 | C:\Users\admin\AppData\Local\TypeId\zsxfpjr\StringIds.exe | C:\Users\admin\AppData\Local\TypeId\zsxfpjr\StringIds.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2808 | "C:\Users\admin\Desktop\Illyrian Stealer v4.1\Patch.exe" | C:\Users\admin\Desktop\Illyrian Stealer v4.1\Patch.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
| (PID) Process: | (1864) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
| Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\Desktop | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\Mono.Cecil.Mdb.dll | executable | |
MD5:1C6ACA0F1B1FA1661FC1E43C79334F7C | SHA256:411F8ED8C49738FA38A56ED8F991D556227D13602E83186E66AE1C4F821C940B | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\Patch.exe | executable | |
MD5:C20BC970E29149BC9C1D6B1E93785684 | SHA256:480C41FEA82AA37C2A2B788D0BB57661967D7D8F8E728F00E038AA21B7B5F89F | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\default.db | sqlite | |
MD5:C2B92AD1FCB7F2D1BA06D3B06E176E23 | SHA256:698524663ADD138171E9E65B8E0517B2F80EBCD5A35014E4AF87ADBACB4B0C40 | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\Newtonsoft.Json.dll | executable | |
MD5:081D9558BBB7ADCE142DA153B2D5577A | SHA256:B624949DF8B0E3A6153FDFB730A7C6F4990B6592EE0D922E1788433D276610F3 | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\Mono.Cecil.Pdb.dll | executable | |
MD5:6D5EB860C2BE5DBEB470E7D3F3E7DDA4 | SHA256:447EDE1984BB4ACD73BD97C0EC57A11C079CEE8301C91FB199CA98C1906D3CC4 | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\Mono.Cecil.Rocks.dll | executable | |
MD5:6E7F0F4FFF6C49E3F66127C23B7F1A53 | SHA256:2E2623319BDC362974A78EA4A43F4893011EC257884D24267F4594142FCD436E | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\plugin\gF.dll | executable | |
MD5:3AEA6530849A1F149CB5F50C73A85691 | SHA256:3B81445260FAFE5259AFCD2FC2EDF97F36B2C48ACD6410EBB731B5E71CD38034 | |||
| 1864 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1864.40350\Illyrian Stealer v4.1\Mono.Cecil.dll | executable | |
MD5:DE69BB29D6A9DFB615A90DF3580D63B1 | SHA256:F66F97866433E688ACC3E4CD1E6EF14505F81DF6B26DD6215E376767F6F954BC | |||
| 2808 | Patch.exe | C:\Users\admin\AppData\Local\Temp\NSmöskbdlfn.exe | executable | |
MD5:6A426FB963F3459070557D03515A63A8 | SHA256:7F243C669C8522E2532A17CC71CE1796097BA178E823571CAF69AC8C4A670ED4 | |||
| 3124 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZJLJTVNCCAQE244AA4EF.temp | binary | |
MD5:16F6D260068B85896C0EBB2E1B2A60D1 | SHA256:6E3B1EF1FB4736A9BF18FADF8E42935CC5053478B6F403A38EFBA8500E819984 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4000 | Server.exe | GET | 204 | 142.250.184.238:80 | http://google.com/generate_204 | unknown | — | — | unknown |
4000 | Server.exe | GET | 204 | 142.250.184.238:80 | http://google.com/generate_204 | unknown | — | — | unknown |
4000 | Server.exe | GET | 204 | 142.250.184.238:80 | http://google.com/generate_204 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4000 | Server.exe | 142.250.184.238:80 | google.com | GOOGLE | US | whitelisted |
4000 | Server.exe | 20.40.202.25:443 | licensemanager.azurewebsites.net | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
3348 | NSmöskbdlfn.exe | 45.144.152.86:44635 | liveclouds.duckdns.org | Taner Temel | BG | unknown |
1756 | MSBuild.exe | 45.144.152.86:58001 | liveclouds.duckdns.org | Taner Temel | BG | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
licensemanager.azurewebsites.net |
| unknown |
liveclouds.duckdns.org |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3348 | NSmöskbdlfn.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization) |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer Family Activity (Response) |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3348 | NSmöskbdlfn.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |