| File name: | BFFar.rar |
| Full analysis: | https://app.any.run/tasks/87ba69ca-c998-4569-ba73-a58ba215325d |
| Verdict: | Malicious activity |
| Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
| Analysis date: | November 14, 2023, 11:40:00 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 4B6BFDCD9C51B9BB19E2DB2BDA1B829D |
| SHA1: | 621882D6C5C0B9B82187983D3A29861F6DA5CC51 |
| SHA256: | 3BF638FA2262C346F27DD74281A581A188FD227C0874FD24C2173EC6F67B19C4 |
| SSDEEP: | 98304:l1YXlyRyJCTpGqYRkQAtu0YKwafRDdo8J2o1iARDqlP0DIRq1d8Q6YLu7fsPxn0V:zRTEFuyvkOcb97peYsSZSs9Vb6 |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 528 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 756 | ping -n 5 localhost | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1812 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Blox Fruits\.txt | C:\Windows\System32\notepad.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2116 | cmd /c copy /b Endless + Rail + Simulations + Beatles + Championships 2828\Refers.pif | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2312 | C:\Users\admin\AppData\Local\Temp\2797\2828\jsc.exe | C:\Users\admin\AppData\Local\Temp\2797\2828\jsc.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: jsc.exe Exit code: 0 Version: 12.0.51209.34209 built by: FX452RTMGDR Modules
RedLine(PID) Process(2312) jsc.exe C2 (1)45.15.156.142:33597 Botnet@Maksimus33 Err_msg Auth_value3c05a8664d756c04ba672065496ef669 US (14) net.tcp:// / localhost 3c05a8664d756c04ba672065496ef669 Authorization ns1 HC07Eio9IQYfPTtVKwMxQx8DAR0qEyFGHB5TWg== AyxfDwZaOgMwMTgdKhM5Tg== Ringgits | |||||||||||||||
| 2484 | "C:\Users\admin\Desktop\Blox Fruits\Method 2\loader.exe" | C:\Users\admin\Desktop\Blox Fruits\Method 2\loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2644 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Blox Fruits\0jdnnqdx0h.txt | C:\Windows\System32\notepad.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2784 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Blox Fruits\34.txt | C:\Windows\System32\notepad.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2864 | "C:\Users\admin\Desktop\Blox Fruits\Method 2\loader.exe" | C:\Users\admin\Desktop\Blox Fruits\Method 2\loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2964 | "C:\Users\admin\Desktop\Blox Fruits\Method 2\loader.exe" | C:\Users\admin\Desktop\Blox Fruits\Method 2\loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
| (PID) Process: | (3428) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
| Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\Desktop | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3428 | WinRAR.exe | C:\Users\admin\Desktop\Blox Fruits\Client.config | — | |
MD5:— | SHA256:— | |||
| 3428 | WinRAR.exe | C:\Users\admin\Desktop\Blox Fruits\ai.cfg | text | |
MD5:73ED0E22C8CC70ED93DFD0C1B8F81E19 | SHA256:DB9EC7AE21D140904D44D6E6550C0C964E32EF11C055696B355835905C9C3A53 | |||
| 3572 | BFruits Script.exe | C:\Users\admin\AppData\Local\Temp\49504\Rail | binary | |
MD5:5548B95B6FC4AAB2B874EC4B205CA0FB | SHA256:001C53DFB1CC9BED7D5A0F549987D10229AD68D95C9F261CA92725A9438038A5 | |||
| 3428 | WinRAR.exe | C:\Users\admin\Desktop\Blox Fruits\cacert.pem | text | |
MD5:39F89143815797C4A41C62F30F137094 | SHA256:5513AA54AFE134569E08B27AA61E60E888AB31D9E112F8C5881ADBAECC817678 | |||
| 3572 | BFruits Script.exe | C:\Users\admin\AppData\Local\Temp\49504\Simulations | binary | |
MD5:72BDA3318EE9559E77A9E85B40F96726 | SHA256:E59924C38F83DD87650D2240EDE8B8C3A349EE8E120E167ACA9B383E3CBAE13A | |||
| 3428 | WinRAR.exe | C:\Users\admin\Desktop\Blox Fruits\BFruits Script.exe | executable | |
MD5:8E370C99412B4314F530F64C3939B5B8 | SHA256:C39F8D7B0A96565E50B46D03083CFB61E9AB4FB9D1556F5F5AF25C12457ECC67 | |||
| 3572 | BFruits Script.exe | C:\Users\admin\AppData\Local\Temp\49504\Endless | executable | |
MD5:D1B8E3DDED92E3E7EA8073AE615FD9E7 | SHA256:9F34CF3450224C87F62DB2313F766FFA84D3FC954977DC61D61783EA4E4A24BF | |||
| 3572 | BFruits Script.exe | C:\Users\admin\AppData\Local\Temp\49504\Conduct | text | |
MD5:B74EEB648A137D645321FB406A0B7C61 | SHA256:99979D608E45E94964A06787FFFA7A1A014C3BF593848A0A93ABDC0C37DF2E77 | |||
| 3572 | BFruits Script.exe | C:\Users\admin\AppData\Local\Temp\49504\Shipping | text | |
MD5:899F4E9C892AD81756A95364E2BF96DE | SHA256:6FE54BF0FCACC04F86462DB93AAB8FA18B2DB63E32BADB11552374FC6181F16B | |||
| 3428 | WinRAR.exe | C:\Users\admin\Desktop\Blox Fruits\binkawin.asi | executable | |
MD5:D51B5B46735B25C2D8372608159ED1A9 | SHA256:DD68562B5E4686E1A07603057DB7A12040821BEADD81D142BFB6A57D2DE45DDB | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4040 | jsc.exe | 45.15.156.142:33597 | — | Galaxy LLC | RU | malicious |
2312 | jsc.exe | 45.15.156.142:33597 | — | Galaxy LLC | RU | malicious |
2484 | loader.exe | 146.70.169.164:2227 | — | — | RO | unknown |
2864 | loader.exe | 146.70.169.164:2227 | — | — | RO | unknown |
2964 | loader.exe | 146.70.169.164:2227 | — | — | RO | unknown |
Domain | IP | Reputation |
|---|---|---|
qwZCNiDTZYrQbGo.qwZCNiDTZYrQbGo |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
4040 | jsc.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE Redline Stealer Activity (Response) |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
4040 | jsc.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |
4040 | jsc.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |
4040 | jsc.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |