| File name: | warzone hack.rar |
| Full analysis: | https://app.any.run/tasks/02c7a98b-465d-4b9a-9f1b-1e6d754a409c |
| Verdict: | Malicious activity |
| Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
| Analysis date: | October 18, 2023, 13:22:26 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 33A32E82F674B5AD687F48496C8EEF30 |
| SHA1: | 610E773B64600790391161403AF79326B313B1CA |
| SHA256: | 95F8DD2B16AD7A747AA99EDF39DF5C929D5EB13FBD996AF5E32B3A8E03FA547E |
| SSDEEP: | 98304:5+QHjtJw3tMD9n5x53KuPe+oIipH1BQBE18teaBhMYo6rZmV+YN1jVSSYW9YmHOz:AVph0gxupJxh8F+kHg9V/GPwT |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Users\admin\Desktop\warzone hack.exe" | C:\Users\admin\Desktop\warzone hack.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2056 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211) Modules
| |||||||||||||||
| 2752 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\warzone hack.rar" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
| (PID) Process: | (2752) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
| Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\Desktop | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\license.key | text | |
MD5:47C843DAF66FAB1990544A441D430E98 | SHA256:B96A19F8B0A68F67282A2FBF06F1B35EB745B1A4CDCC0D70A1FCA9BED0EE7947 | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\command.cpp | text | |
MD5:42198E1DAC04A824203BAF1CD6F9ACD6 | SHA256:66842410E10B9B2A00C245E98FEBF9D34D8987C74B015E3ABACB3906A8E01024 | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\entities.cpp | text | |
MD5:C9ECB47F9A7773B24A62052B38A47B7C | SHA256:9307F9052AB145C12568C162B9065DF14AA3302A48A77AB82A732756C9622BD4 | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\command.hpp | text | |
MD5:A61E6D15FA5E0D6F559F46B880B6C90A | SHA256:D8254A35D34A8DD24AAF4AE5FF1728D792B6619E94A9E5232ADA0E2016837091 | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\global_table.hpp | text | |
MD5:8A7FC06D1FACEA6ED7B84F5D35F56CA8 | SHA256:42CF6F57E525521547D50ED573D72B404355A8FE0586557A47CA5076166F526A | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\gui\base_text_element.cpp | text | |
MD5:6C02598EB8BF67044F32C9FD0F574A4B | SHA256:C7A2BCDC16724E5B90DFB6B247F1BB6C455F7399705509CED3516F2DD2EEDD9F | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\gui\checkbox.cpp | text | |
MD5:0DEB2EDD1A39FFFDF28677A235D69201 | SHA256:5F9E27071229E218C5AD1ED9A947C189D147FFEB5F983B6A6FE6F7D6C20E711D | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\gui\button.cpp | text | |
MD5:14268E9BD9D8206FF170A9FA1CE087B7 | SHA256:56AAE2E652BABF38F419265F838674929FDAA77DD8328F19177EFD0A77300825 | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\gui\button.hpp | text | |
MD5:300108DF716D37BC5C34C320DE116870 | SHA256:599A665058C85146DD2A965163F12AF6A5CE2FFDEC233752305E6C213BF99F78 | |||
| 2752 | WinRAR.exe | C:\Users\admin\Desktop\resource\lua\bindings\gui\checkbox.hpp | text | |
MD5:2CAEA469DC15805EEC05B3210C22D5C2 | SHA256:D1BEA574120ED10A4A7FB25F2D9478C09CBE0CA854FEB0201FC87D86AEA11083 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
120 | warzone hack.exe | 91.103.252.3:23000 | — | Hostglobal.plus Ltd | GB | malicious |
PID | Process | Class | Message |
|---|---|---|---|
120 | warzone hack.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
120 | warzone hack.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
120 | warzone hack.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) |
120 | warzone hack.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) |
120 | warzone hack.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) |
120 | warzone hack.exe | A Network Trojan was detected | ET MALWARE Redline Stealer Activity (Response) |
120 | warzone hack.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |
120 | warzone hack.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |