File name:

BLTools v2.0.1.zip

Full analysis: https://app.any.run/tasks/7c163afd-6e01-47c3-a0ca-f111e7a52fbe
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: December 17, 2024, 17:26:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
redline
crypto-regex
discordgrabber
generic
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

FC361CB4F6F99AA60CB512C45C51854A

SHA1:

F30BA1C7A121870C87A8F62D74867B3D5FBDF7C7

SHA256:

AB61C59DC57111442E2C2EC44E4F51BF7D5145A26290564693485C88E672A098

SSDEEP:

49152:7/idc8hyjt8xBxg4m92vfpHpjJW1j6/lJNDknAtHDDqW4/CDlwg8fR0+MyOvkWV/:7adcEyjkxz7v81QJFjW/iX8fR9MyOsWh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6688)
    • DISCORDGRABBER has been detected (YARA)

      • BLTools.exe (PID: 5460)
    • REDLINE has been detected (YARA)

      • build.exe (PID: 4824)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • BLTools v2.0.1.exe (PID: 3988)
    • Executing commands from a ".bat" file

      • BLTools v2.0.1.exe (PID: 3988)
    • Reads security settings of Internet Explorer

      • BLTools.exe (PID: 7164)
      • BLTools.exe (PID: 5460)
    • Found regular expressions for crypto-addresses (YARA)

      • BLTools.exe (PID: 5460)
    • Connects to unusual port

      • build.exe (PID: 4824)
  • INFO

    • Manual execution by a user

      • BLTools v2.0.1.exe (PID: 3988)
      • BLTools.exe (PID: 7164)
    • Checks supported languages

      • BLTools v2.0.1.exe (PID: 3988)
      • build.exe (PID: 4824)
      • BLTools.exe (PID: 5460)
      • BLTools.exe (PID: 7164)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6688)
    • Reads the computer name

      • BLTools.exe (PID: 5460)
      • BLTools.exe (PID: 7164)
    • Create files in a temporary directory

      • BLTools v2.0.1.exe (PID: 3988)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6688)
    • Reads the machine GUID from the registry

      • build.exe (PID: 4824)
      • BLTools.exe (PID: 5460)
      • BLTools.exe (PID: 7164)
    • Disables trace logs

      • build.exe (PID: 4824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(4824) build.exe
C2 (1)83.168.106.102:58561
BotnetVIXZZTRAFFIC
Keys
Xor
Options
ErrorMessage
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:10:16 14:56:14
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: BLTools v2.0.1/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs bltools v2.0.1.exe conhost.exe no specs cmd.exe no specs #DISCORDGRABBER bltools.exe no specs #REDLINE build.exe conhost.exe no specs bltools.exe

Process information

PID
CMD
Path
Indicators
Parent process
2452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exebuild.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3208\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBLTools v2.0.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3620"C:\WINDOWS\sysnative\cmd" /c "C:\Users\admin\AppData\Local\Temp\85CD.tmp\85CE.tmp\85CF.bat "C:\Users\admin\Desktop\BLTools v2.0.1\BLTools v2.0.1.exe""C:\Windows\System32\cmd.exeBLTools v2.0.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
3988"C:\Users\admin\Desktop\BLTools v2.0.1\BLTools v2.0.1.exe" C:\Users\admin\Desktop\BLTools v2.0.1\BLTools v2.0.1.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\bltools v2.0.1\bltools v2.0.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4824"build.exe" C:\Users\admin\Desktop\BLTools v2.0.1\build.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Description:
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\bltools v2.0.1\build.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
RedLine
(PID) Process(4824) build.exe
C2 (1)83.168.106.102:58561
BotnetVIXZZTRAFFIC
Keys
Xor
Options
ErrorMessage
5460"BLTools.exe" C:\Users\admin\Desktop\BLTools v2.0.1\BLTools.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Description:
BLTools
Version:
2.0.1.0
Modules
Images
c:\users\admin\desktop\bltools v2.0.1\bltools.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6688"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\BLTools v2.0.1.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7132C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7164"C:\Users\admin\Desktop\BLTools v2.0.1\BLTools.exe" C:\Users\admin\Desktop\BLTools v2.0.1\BLTools.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
BLTools
Version:
2.0.1.0
Modules
Images
c:\users\admin\desktop\bltools v2.0.1\bltools.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
4 992
Read events
4 970
Write events
22
Delete events
0

Modification events

(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\BLTools v2.0.1.zip
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4824) build.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4824) build.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
6
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\build.exeexecutable
MD5:4858CCF2A64D222C6C58214038AE4100
SHA256:A0C0B0586A277CCE9E292932069619C114C5C6DE3250E0834DA6E63DC46B23CD
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\Ookii.Dialogs.Wpf.dllexecutable
MD5:932EBB3F9E7113071C6A17818342B7CC
SHA256:285AA8225732DDBCF211B1158BD6CFF8BF3ACBEEAB69617F4BE85862B7105AB5
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\BLTools.exeexecutable
MD5:FA72164D8F0DA721E9F429A4683D86F5
SHA256:A28BE060EE0943D97303BB55257570393CBFD7A990CC6A20ED64F7705DF9E5EE
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\AlphaFS.dllexecutable
MD5:F2F6F6798D306D6D7DF4267434B5C5F9
SHA256:837F2CEAB6BBD9BC4BF076F1CB90B3158191888C3055DD2B78A1E23F1C3AAFDD
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\Extreme.Net.dllexecutable
MD5:F79F0E3A0361CAC000E2D3553753CD68
SHA256:8A6518AB7419FBEC3AC9875BAA3AFB410AD1398C7AA622A09CD9084EC6CADFCD
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\BLTools v2.0.1.exeexecutable
MD5:DDD338644FD505DD1B0C20BE2AD7E08A
SHA256:217A77B50750C4325A4CF2FFD447E81404B2A8764C915C3EBB47A9E5FBBBFC90
6688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6688.23216\BLTools v2.0.1\Settings.initext
MD5:A89137CC821D41C15AE8C93F61D2ABC3
SHA256:DC4C70AF18DCD0FE7F9CD0D291F839C4A573073BB2C255F72E5DCE9966D5A4CC
3988BLTools v2.0.1.exeC:\Users\admin\AppData\Local\Temp\85CD.tmp\85CE.tmp\85CF.battext
MD5:CA2BC76999B4AE9A98BFA6745F2F6B89
SHA256:5B934BDE7F0A5B04CA8D6A47DE63D3A03E3089D2C11DCDD8DD298870A6BC6A51
5460BLTools.exeC:\Windows\System32\drivers\etc\hoststext
MD5:85005F4D1BE0DFE6A3707DBCCFA635EA
SHA256:1C8E2765DECC6D1DB6FFA250BAF9926DEB4895ABC1A013233930CE7D9637AB5B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
36
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4328
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6528
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1476
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1476
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.23.209.148:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4328
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.106
whitelisted
www.bing.com
  • 2.23.209.148
  • 2.23.209.176
  • 2.23.209.140
  • 2.23.209.150
  • 2.23.209.182
  • 2.23.209.185
  • 2.23.209.149
  • 2.23.209.177
  • 2.23.209.179
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.186.78
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.64
  • 20.190.159.23
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.75
  • 20.190.159.71
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info