File name:

Octalyn.rar

Full analysis: https://app.any.run/tasks/785f3c72-bf2f-4c36-8f3a-c5c8597f5dcb
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 29, 2025, 11:05:30
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
octalyn
stealer
evasion
arch-doc
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

781FA303D7DF158A8F70F5A941D78911

SHA1:

8B4EF61C0A13497C46646D848770554EEA420623

SHA256:

AC751A61CCEFF15349DE19ED1FC4DC7E5B11828BF1143DBB225A12EA8E049FC4

SSDEEP:

98304:NB70chEZk1R6l/bkt/neGtrk0k04gLQxir7wG0074Jn8kEjQOc7WFAYaokmAMiHQ:mjGMQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5072)
    • Actions looks like stealing of personal data

      • Build.exe (PID: 4528)
    • Steals credentials from Web Browsers

      • Build.exe (PID: 4528)
    • OCTALYN has been detected

      • Build.exe (PID: 4528)
      • powershell.exe (PID: 3900)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 3096)
      • powershell.exe (PID: 3900)
    • OCTALYN has been detected (YARA)

      • Octalyn.exe (PID: 5176)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Octalyn.exe (PID: 5176)
    • Starts POWERSHELL.EXE for commands execution

      • Build.exe (PID: 4528)
      • Build.exe (PID: 444)
    • Loads DLL from Mozilla Firefox

      • Build.exe (PID: 4528)
    • Checks for external IP

      • Build.exe (PID: 4528)
      • Build.exe (PID: 444)
    • Potential Corporate Privacy Violation

      • Build.exe (PID: 4528)
      • Build.exe (PID: 444)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 3900)
  • INFO

    • Manual execution by a user

      • Octalyn.exe (PID: 5176)
      • Build.exe (PID: 4528)
      • Build.exe (PID: 444)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5072)
    • Create files in a temporary directory

      • Octalyn.exe (PID: 5176)
      • Build.exe (PID: 4528)
    • Checks supported languages

      • Octalyn.exe (PID: 5176)
      • Build.exe (PID: 4528)
    • Reads the computer name

      • Octalyn.exe (PID: 5176)
      • Build.exe (PID: 4528)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 5072)
    • Reads the software policy settings

      • slui.exe (PID: 3268)
      • slui.exe (PID: 2560)
    • Compiled with Borland Delphi (YARA)

      • Octalyn.exe (PID: 5176)
      • slui.exe (PID: 2560)
    • Checks proxy server information

      • slui.exe (PID: 2560)
    • Creates files or folders in the user directory

      • Build.exe (PID: 4528)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 3900)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 3900)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 3900)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 3900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 2314249
UncompressedSize: 7451136
OperatingSystem: Win32
ArchivedFileName: Octalyn/Octalyn.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
11
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe #OCTALYN octalyn.exe slui.exe #OCTALYN build.exe #OCTALYN powershell.exe no specs conhost.exe no specs build.exe powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444"C:\Users\admin\Desktop\Build.exe" C:\Users\admin\Desktop\Build.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\build.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2560C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3096C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -Command "Compress-Archive -Path 'C:\Users\admin\AppData\Local\Temp\Octalyn' -DestinationPath 'C:\Users\admin\AppData\Local\Temp\admin_OctalynRetrieved.zip'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeBuild.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
3268"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3900C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -Command "Compress-Archive -Path 'C:\Users\admin\AppData\Local\Temp\Octalyn' -DestinationPath 'C:\Users\admin\AppData\Local\Temp\admin_OctalynRetrieved.zip'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Build.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
4528"C:\Users\admin\Desktop\Build.exe" C:\Users\admin\Desktop\Build.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\build.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5072"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Octalyn.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5176"C:\Users\admin\Desktop\Octalyn.exe" C:\Users\admin\Desktop\Octalyn.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\octalyn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5204\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
12 691
Read events
12 683
Write events
8
Delete events
0

Modification events

(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Octalyn.rar
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5072) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
5
Suspicious files
52
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
4528Build.exeC:\Users\admin\AppData\Local\Temp\Octalyn\discord.txt
MD5:
SHA256:
4528Build.exeC:\Users\admin\AppData\Local\Temp\0JLNGhe.db
MD5:
SHA256:
4528Build.exeC:\Users\admin\AppData\Local\Temp\Octalyn\passwords.txt
MD5:
SHA256:
4528Build.exeC:\Users\admin\AppData\Local\Temp\XP6FFds.db
MD5:
SHA256:
5072WinRAR.exeC:\Users\admin\Desktop\Octalyn.exeexecutable
MD5:0A705E20864B451A3F3B845FA01C0AAD
SHA256:D61806D1A950940B21014131532FC0B99E6B090F40DABBE5CC5DC30018F29AF2
4528Build.exeC:\Users\admin\AppData\Local\Temp\Octalyn\autofill.txt
MD5:
SHA256:
4528Build.exeC:\Users\admin\AppData\Local\Temp\qj6jb8a.dbbinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
4528Build.exeC:\Users\admin\AppData\Local\Temp\0JLNGhe.db-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
5176Octalyn.exeC:\Users\admin\Desktop\Build.exeexecutable
MD5:A1697B68640809AD73802F15AAAB7188
SHA256:641E1AD00A8094A73D535ECE579D5291AFA47374FF59B9A6486798A3EB3B6124
5176Octalyn.exeC:\Users\admin\AppData\Local\Temp\OctalynStub_temp.exeexecutable
MD5:A1697B68640809AD73802F15AAAB7188
SHA256:641E1AD00A8094A73D535ECE579D5291AFA47374FF59B9A6486798A3EB3B6124
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
32
DNS requests
18
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.19.194.200:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5720
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4528
Build.exe
GET
200
104.26.13.205:80
http://api.ipify.org/?format=text
unknown
malicious
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.22.98.7:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5720
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5360
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
444
Build.exe
GET
200
104.26.13.205:80
http://api.ipify.org/?format=text
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.194.200:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.19.194.200:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
2104
svchost.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
5496
MoUsoCoreWorker.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
5496
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.251.39.110
whitelisted
crl.microsoft.com
  • 2.19.194.200
whitelisted
www.microsoft.com
  • 23.200.189.225
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.130
whitelisted
ocsp.digicert.com
  • 2.22.98.7
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
4528
Build.exe
Potential Corporate Privacy Violation
ET INFO External IP Lookup (ipify .org)
444
Build.exe
Potential Corporate Privacy Violation
ET INFO External IP Lookup (ipify .org)
4528
Build.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
444
Build.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
No debug info