| File name: | SecuriteInfo.com.Win32.PWSX-gen.3990.15024 |
| Full analysis: | https://app.any.run/tasks/83750351-ae7d-408b-b46a-751ae1039908 |
| Verdict: | Malicious activity |
| Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
| Analysis date: | October 21, 2023, 01:42:19 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386, for MS Windows |
| MD5: | 0AA2147468EB375C032F979F1FC2F959 |
| SHA1: | 100F16FCD4CB7148FE7A1D3FBBC8E52A2D9B1C5A |
| SHA256: | AF54A35DD3CE3D2584BCC29D858664B3FC7304F0996D7BF07F6AE95E75C5E698 |
| SSDEEP: | 12288:/ThKHHNhAYRcPpSNQE1aCbv5eW5XnKGNSv:EHbMSZJv5vXKGNM |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:10:21 01:00:00+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 124416 |
| InitializedDataSize: | 387072 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xbc53 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 6.46.272.6 |
| ProductVersionNumber: | 6.46.272.6 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| Comments: | Mankind waistband |
| CompanyName: | Political widow diversions |
| FileDescription: | Dependence facsimiles emendation |
| FileVersion: | 6.46.272.6 |
| InternalName: | Molarities triumphing |
| LegalCopyright: | Copyright © Quadrangular frighten unsealed castiron gruffly tug |
| LegalTrademarks: | Headwinds stamp |
| OriginalFileName: | Unintentional dazedly |
| ProductName: | Pasteurisation |
| ProductVersion: | 6.46.272.6 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2612 | "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe" | C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | 85.209.11.85:41140 | — | LLC Baxet | RU | unknown |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
PID | Process | Class | Message |
|---|---|---|---|
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) |
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) |
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |
2612 | SecuriteInfo.com.Win32.PWSX-gen.3990.15024.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |