| File name: | 2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader |
| Full analysis: | https://app.any.run/tasks/381eb031-9b65-41f4-a584-d09e91302044 |
| Verdict: | Malicious activity |
| Threats: | Qbot is a banking Trojan — a malware designed to collect banking information from victims. Qbot targets organizations mostly in the US. It is equipped with various sophisticated evasion and info-stealing functions and worm-like functionality, and a strong persistence mechanism. |
| Analysis date: | May 15, 2025, 12:28:55 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections |
| MD5: | 05792AFB23CFB67FE7097E26BA3C1248 |
| SHA1: | BA652430744DACA86C37E457C06D10DBD4FE3ED2 |
| SHA256: | 902E601A89C5042116A4AFB78209D56D1310E776F65F4CC8ECC5D9EA577C68A7 |
| SSDEEP: | 12288:Fei2os3hhhhhhhhh9hhhhhhhhhLhhhhhhhhhLhhhhhhhhhLhhhhhhhhhLhhhhhhW:FB2os3hhhhhhhhh9hhhhhhhhhLhhhhhp |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2002:10:05 16:30:39+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 259072 |
| InitializedDataSize: | 14336 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3a189 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 7656 | "C:\Users\admin\Desktop\2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe" | C:\Users\admin\Desktop\2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 7844 | C:\Users\admin\Desktop\2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe /C | C:\Users\admin\Desktop\2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe | 2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 8040 | "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\WINDOWS\System32\calc.exe" > "C:\Users\admin\Desktop\2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe" | C:\Windows\SysWOW64\cmd.exe | 2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8048 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8100 | ping.exe -n 6 127.0.0.1 | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8172 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 8040 | cmd.exe | C:\Users\admin\Desktop\2025-05-15_05792afb23cfb67fe7097e26ba3c1248_amadey_elex_gcleaner_redline-stealer_smoke-loader.exe | executable | |
MD5:961E093BE1F666FD38602AD90A5F480F | SHA256:B183BD6414C5123465075D76D2413C999D569492FB543ACBC29690B4B745BDF2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
7412 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8172 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |