File name:

EXloader.rar

Full analysis: https://app.any.run/tasks/806c60f5-a8c5-4b40-8cb2-8178442130d7
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: December 01, 2023, 12:55:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
redline
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

EC23ADDBD39E1DF710CA7932D32CF4F7

SHA1:

31B494237F4C13CD529C3A5FDABE9145AE18A8A6

SHA256:

4FC0E939AA75E3DB5A329045C850F78E3777E8A8C8D6DA8D9C1B6538CC150C39

SSDEEP:

12288:YYjv1X88wopxMK/BKG49wuhYtd7KXDt6Rou7HdXsIQP:YYz1MAX+auStdwDt6Rf7HdXsIg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • Launcher.exe (PID: 2764)
    • REDLINE has been detected (SURICATA)

      • Launcher.exe (PID: 2764)
    • Connects to the CnC server

      • Launcher.exe (PID: 2764)
    • Actions looks like stealing of personal data

      • Launcher.exe (PID: 2764)
  • SUSPICIOUS

    • Connects to unusual port

      • Launcher.exe (PID: 2764)
    • Searches for installed software

      • Launcher.exe (PID: 2764)
    • Reads browser cookies

      • Launcher.exe (PID: 2764)
  • INFO

    • Manual execution by a user

      • explorer.exe (PID: 3796)
      • Launcher.exe (PID: 2764)
      • wmpnscfg.exe (PID: 3388)
      • wmpnscfg.exe (PID: 3204)
    • Checks supported languages

      • Launcher.exe (PID: 2764)
      • wmpnscfg.exe (PID: 3388)
      • wmpnscfg.exe (PID: 3204)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2144)
    • Reads the computer name

      • Launcher.exe (PID: 2764)
      • wmpnscfg.exe (PID: 3388)
      • wmpnscfg.exe (PID: 3204)
    • Reads the machine GUID from the registry

      • Launcher.exe (PID: 2764)
    • Reads product name

      • Launcher.exe (PID: 2764)
    • Reads Environment values

      • Launcher.exe (PID: 2764)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs explorer.exe no specs #REDLINE launcher.exe wmpnscfg.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2144"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\EXloader.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2764"C:\Users\admin\AppData\Local\Temp\EXloader\EXloader\Launcher.exe" C:\Users\admin\AppData\Local\Temp\EXloader\EXloader\Launcher.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\exloader\exloader\launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
3204"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3388"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3796"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
3 632
Read events
3 605
Write events
9
Delete events
18

Modification events

(PID) Process:(2144) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2144) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2764) Launcher.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
0AFF97CD06EF0F6CC1F8FBE057227F769EA5D3968F1D8EB3F8CC3641FAEC8D90
(PID) Process:(2764) Launcher.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Users\admin\AppData\Local\Google\Chrome\User Data\lockfile
Executable files
8
Suspicious files
8
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\locales\service-2023-09-21-184358.logbinary
MD5:CE1BB99B04EED6C7B257F40B303ACD75
SHA256:D722277BAA73F0D1178CD9EE4A9143627F1349D6F6D8095E3BD45DB9DE19F652
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\Qt5Core.dllexecutable
MD5:9D05666DCFA76EDD18194F62148AF50E
SHA256:8B4EBF3129DEE8D8CC613502004882111D318E6E6172807D4ABD63CD2A2AABF8
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\preloader.dllexecutable
MD5:218A905DDE00690C0DF0CF3FF51D7EDF
SHA256:8023AF161301E71E9A827D8EE567713286C3407F90899E745FEA1533B038A66C
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\Qt5Svg.dllexecutable
MD5:06CC5D18A496520E05BCFEE1E3169535
SHA256:EA31035FA96BA656D64B58D4F1A9DD210DF7154AFAD3D4F96EE36B41584E4360
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\README.txttext
MD5:3E0DBD9D30D6566CFBAB7A02255A9567
SHA256:EE42D138C5EAFA4FE94887F1C0C7D028A9C506C8752A3D12CD681CCD098ACC56
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\tpm\preloader (2).dllexecutable
MD5:218A905DDE00690C0DF0CF3FF51D7EDF
SHA256:8023AF161301E71E9A827D8EE567713286C3407F90899E745FEA1533B038A66C
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\tpm\sys-2023-10-01-125913 (2).logbinary
MD5:79EC5C76CAAC2A8A6BD0EA8059A093F2
SHA256:6A1D7FEDC46DF4628B536D74CCCDA300062F89AB36C5CAD51E6D4041C7C3515C
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\tpm\preloader.dllexecutable
MD5:218A905DDE00690C0DF0CF3FF51D7EDF
SHA256:8023AF161301E71E9A827D8EE567713286C3407F90899E745FEA1533B038A66C
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\ssleay32.dllexecutable
MD5:DF38EB2002E5979E57BABF8B4F6A2F82
SHA256:5C2F10A772EDFBEEF8A5261B8677E68C4194CB87F3CB9BC319C8DA75CFAEFA3F
2144WinRAR.exeC:\Users\admin\AppData\Local\Temp\EXloader\EXloader\✅password✅--free.txttext
MD5:E15BD28675BD0C9DE357C3BFDC0AF142
SHA256:78B5EB853F96CE0C76D58E980DAC9AD0AF9058E9204F4B768339ABA0D5A93266
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
0
Threats
10

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
2764
Launcher.exe
45.15.156.142:33597
Galaxy LLC
RU
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2764
Launcher.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization)
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC - Id1Response
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE Redline Stealer Family Activity (Response)
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2764
Launcher.exe
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt
2764
Launcher.exe
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt
2764
Launcher.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
No debug info