| File name: | RubyInstaller.zip |
| Full analysis: | https://app.any.run/tasks/f38be00b-af6e-4ffa-a1ff-483ad9576bb7 |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | April 29, 2025, 09:56:03 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=store |
| MD5: | 90CBED2E8F839842BE433D7C001F4278 |
| SHA1: | D50E03C015EC4DB9E84274917B7418296F3CB218 |
| SHA256: | 9325B95B119309A6C4EFF73859569D83E85A6E6B67AD23E0E052458E834EF9C7 |
| SSDEEP: | 196608:DxRPWB1OlSuzMpd+VSFW5jIqdObehW6rCKloUuJm8rX9tbr:DDuB19gVVWUw6UoFlG9tbr |
| .zip | | | ZIP compressed archive (36.3) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:07:23 07:46:20 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | Ruby Installer/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2040 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3008 | "C:\Users\admin\Desktop\Ruby Installer\Ruby Installer.exe" | C:\Users\admin\Desktop\Ruby Installer\Ruby Installer.exe | explorer.exe | ||||||||||||
User: admin Company: dacheats.co Integrity Level: MEDIUM Description: Ruby Installer Exit code: 0 Version: 1.2.0.0 Modules
ims-api(PID) Process(3008) Ruby Installer.exe Telegram-Tokens (1)7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto Telegram-Info-Links 7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto Get info about bothttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getMe Get incoming updateshttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getUpdates Get webhookhttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getWebhookInfo Delete webhookhttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/deleteWebhook?drop_pending_updates=true (PID) Process(3008) Ruby Installer.exe Telegram-Tokens (1)7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto Telegram-Info-Links 7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto Get info about bothttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getMe Get incoming updateshttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getUpdates Get webhookhttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getWebhookInfo Delete webhookhttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/deleteWebhook?drop_pending_updates=true Telegram-Requests Token7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto End-PointsendPhoto Args chat_id (1)-4248047512 parse_mode (1)HTML caption (1)CStealer (Telegram Version)
https://t.me/cstealerr
👨👩👧👦 Team Name: Default
👷♂️ Worker ID: 0001
🦣 Name: admin
📱 Phone: Not Available
📬 E-Mail: Not Available
🌏 IP: None (😕 GL-DB)
💻 OS%3 (PID) Process(3008) Ruby Installer.exe Telegram-Tokens (1)7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto Telegram-Info-Links 7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto Get info about bothttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getMe Get incoming updateshttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getUpdates Get webhookhttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/getWebhookInfo Delete webhookhttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/deleteWebhook Drop incoming updateshttps://api.telegram.org/bot7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto/deleteWebhook?drop_pending_updates=true Telegram-Requests Token7314319960:AAG8duFZrF4eB35xJR-_JxiSudg5dlbhfto End-PointsendPhoto Args | |||||||||||||||
| 4188 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | Ruby Installer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4428 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\RubyInstaller.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 4608 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6112 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\RubyInstaller.zip | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
| (PID) Process: | (4428) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\mixins.pyc | binary | |
MD5:9661427DC1D4F1A3E0166494C5B2FACE | SHA256:065B30895703FDA5E93EAD0051132B8EC7CB451B391CD3BADA67A5B3A66A9C0A | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\base_events.pyc | binary | |
MD5:73D4D9419CB7446D9873A901D9DBEE95 | SHA256:5445E67212BEBCEDE5CEED27C19D8FA43C4D517AEA3FE119592A153B4956048B | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\base_subprocess.pyc | binary | |
MD5:6D34066672FCE4E28E63B33BC1E04FF2 | SHA256:DBEBC419591BDFB31619C7CF429D9C04699C0ADC07CCDF8FA7F260F6A6BE9DD3 | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\base_tasks.pyc | binary | |
MD5:680E522B9A2F58875F56DC406C050632 | SHA256:94247088CB8111A7AA94E77FB6419EFC69DE426FE593697E5613487EF669B111 | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\events.pyc | binary | |
MD5:40AF50C688F6475473DDF8D4B659BA86 | SHA256:288C7D30B956B774D12C4F6364287C04A23CB1E76BF04B1B5BF634854B0A1F76 | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\locks.pyc | binary | |
MD5:9734FAD1704D1697484BE6E4ED08FBB7 | SHA256:049A61A9B84EAC875F169D23B3653A4D8E25560517DB191B41D81A81B5FFBC06 | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\constants.pyc | binary | |
MD5:3BA36BAE5EC7E6FB0B1AE10251181586 | SHA256:510EEA0837BC0350195AF21218426D0D2DD4DB58D01782916E52043B97A4F838 | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\format_helpers.pyc | binary | |
MD5:6F429F57B33E6ECD8A8F21A1ECC82B79 | SHA256:9A049F98EE7D85FF4A013C785127B6A707ACAE4E9008A43900088ED817763D9B | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\coroutines.pyc | binary | |
MD5:2F30AC25F6E022322AF3141DB9D053B9 | SHA256:699EC65EE8F7784B5A5AC6FD67A1170F82E6B2DF283F57A04F431A46406DA940 | |||
| 4428 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4428.39958\Ruby Installer\lib\asyncio\exceptions.pyc | binary | |
MD5:8C384B3C8F18B05DF72116B545A5E558 | SHA256:652E6B935A1CEDDE0C212162A3C3006495EEFB7A5BC8EA8A5E54573DD2589C8C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5960 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 13.95.31.18:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
2104 | svchost.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
5960 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | GET | 304 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
5960 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
660 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6112 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3008 | Ruby Installer.exe | 162.159.128.233:443 | discord.com | CLOUDFLARENET | — | whitelisted |
3008 | Ruby Installer.exe | 172.67.74.152:443 | api.ipify.org | CLOUDFLARENET | US | shared |
3008 | Ruby Installer.exe | 159.89.102.253:443 | geolocation-db.com | DIGITALOCEAN-ASN | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
discord.com |
| whitelisted |
api.ipify.org |
| shared |
geolocation-db.com |
| whitelisted |
api.gofile.io |
| whitelisted |
api.telegram.org |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discord .com) |
2196 | svchost.exe | Misc activity | ET INFO Discord Chat Service Domain in DNS Lookup (discord .com) |
3008 | Ruby Installer.exe | Misc activity | ET INFO Observed Discord Service Domain (discord .com) in TLS SNI |
3008 | Ruby Installer.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) |
3008 | Ruby Installer.exe | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
2196 | svchost.exe | Misc activity | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup |
3008 | Ruby Installer.exe | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
2196 | svchost.exe | Misc activity | ET INFO External IP Lookup Domain in DNS Lookup (geolocation-db .com) |
2196 | svchost.exe | Potentially Bad Traffic | ET FILE_SHARING Online File Storage Domain in DNS Lookup (gofile .io) |
3008 | Ruby Installer.exe | Misc activity | ET INFO External IP Lookup Domain (geolocation-db .com) in TLS SNI |