| File name: | RedEngine Cracked V5.rar |
| Full analysis: | https://app.any.run/tasks/2944b9b8-b5d8-44e8-ba4d-86adafb3d93e |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | May 24, 2021, 17:55:43 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 78696F8710F4DD376ED064B18D1CBD75 |
| SHA1: | 6908D09F84321FA025F60B17BB3698DA3D406BD7 |
| SHA256: | BBC11A7118F6A45FF0C833089BA5BB8FCCE1A9289C6E165328CDDFBBA832247D |
| SSDEEP: | 98304:45tBSlBnnluRI7cglA+3lq8KTTVt/hznuWcXEFlgnpaZ:4TGluO7ccA+3lqZ/r/pRcUFSpaZ |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 272 | "C:\Users\admin\AppData\Local\Temp\RarSFX1\svchost.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX1\svchost.exe | Update RedEngine.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 344 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RedEngine Cracked V5.rar" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 1024 | "C:\Users\admin\AppData\Local\Temp\resourcefilehaha.exe" /C /stext C:\Users\admin\AppData\Local\Temp\credentialslmao.txt | C:\Users\admin\AppData\Local\Temp\resourcefilehaha.exe | RedEngine.exe | ||||||||||||
User: admin Company: NirSoft Integrity Level: MEDIUM Description: Web Browser Password Viewer Exit code: 0 Version: 2.06 Modules
| |||||||||||||||
| 1500 | "C:\Users\admin\Desktop\RedEngine Cracked\Update RedEngine.exe" | C:\Users\admin\Desktop\RedEngine Cracked\Update RedEngine.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1872 | "C:\Users\admin\AppData\Local\Temp\RedEngine.exe" | C:\Users\admin\AppData\Local\Temp\RedEngine.exe | RedEngine.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 3762504530 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2648 | "C:\Users\admin\AppData\Local\Temp\resourcefilehaha2.exe" /C /stext C:\Users\admin\AppData\Local\Temp\cookieslmao.txt | C:\Users\admin\AppData\Local\Temp\resourcefilehaha2.exe | — | RedEngine.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2680 | "C:\Users\admin\AppData\Local\Temp\RedEngine.exe" | C:\Users\admin\AppData\Local\Temp\RedEngine.exe | — | RedEngine.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2692 | "C:\Users\admin\AppData\Local\Temp\RarSFX0\RedEngine.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX0\RedEngine.exe | RedEngine.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 3404 | "C:\Users\admin\Desktop\RedEngine Cracked\RedEngine.exe" | C:\Users\admin\Desktop\RedEngine Cracked\RedEngine.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3552 | "C:\Users\admin\AppData\Local\Temp\resourcefilehaha.exe" /C /stext C:\Users\admin\AppData\Local\Temp\credentialslmao.txt | C:\Users\admin\AppData\Local\Temp\resourcefilehaha.exe | RedEngine.exe | ||||||||||||
User: admin Company: NirSoft Integrity Level: HIGH Description: Web Browser Password Viewer Exit code: 0 Version: 2.06 Modules
| |||||||||||||||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E |
| Operation: | write | Name: | @C:\Windows\system32\NetworkExplorer.dll,-1 |
Value: Network | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\RedEngine Cracked V5.rar | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (344) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3404) RedEngine.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 344 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa344.30012\RedEngine Cracked\Fivem.CFX.dll | — | |
MD5:— | SHA256:— | |||
| 344 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa344.30012\RedEngine Cracked\InjectAPI.dll | — | |
MD5:— | SHA256:— | |||
| 344 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa344.30012\RedEngine Cracked\WebSocket.2.1.version.dll | — | |
MD5:— | SHA256:— | |||
| 344 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa344.30012\RedEngine Cracked\Update RedEngine.exe | — | |
MD5:— | SHA256:— | |||
| 344 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa344.30012\RedEngine Cracked\RedEngine.exe | — | |
MD5:— | SHA256:— | |||
| 2692 | RedEngine.exe | C:\Users\admin\AppData\Local\Temp\screen.jpg | — | |
MD5:— | SHA256:— | |||
| 1024 | resourcefilehaha.exe | C:\Users\admin\AppData\Local\Temp\credentialslmao.txt | — | |
MD5:— | SHA256:— | |||
| 2692 | RedEngine.exe | C:\Users\admin\AppData\Local\Temp\browsercredentials.txt | — | |
MD5:— | SHA256:— | |||
| 3960 | resourcefilehaha2.exe | C:\Users\admin\AppData\Local\Temp\cookieslmao.txt | — | |
MD5:— | SHA256:— | |||
| 2692 | RedEngine.exe | C:\Users\admin\AppData\Local\Temp\cookiescredentials.txt | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1872 | RedEngine.exe | GET | 200 | 66.171.248.178:80 | http://ipv4bot.whatismyipaddress.com/ | US | text | 13 b | shared |
2692 | RedEngine.exe | GET | 200 | 66.171.248.178:80 | http://ipv4bot.whatismyipaddress.com/ | US | text | 13 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
272 | svchost.exe | 18.198.77.177:17746 | 4.tcp.eu.ngrok.io | Massachusetts Institute of Technology | US | malicious |
272 | svchost.exe | 3.121.139.82:17746 | 4.tcp.eu.ngrok.io | — | US | malicious |
1872 | RedEngine.exe | 199.188.200.202:443 | www.stelybuilder.wtf | Namecheap, Inc. | US | suspicious |
272 | svchost.exe | 8.8.8.8:53 | — | Google Inc. | US | malicious |
— | — | 192.168.100.24:137 | — | — | — | malicious |
272 | svchost.exe | 3.127.253.86:17746 | 4.tcp.eu.ngrok.io | — | US | malicious |
272 | svchost.exe | 35.158.159.254:17746 | 4.tcp.eu.ngrok.io | Amazon.com, Inc. | DE | malicious |
2692 | RedEngine.exe | 66.171.248.178:80 | ipv4bot.whatismyipaddress.com | Alchemy Communications, Inc. | US | malicious |
2692 | RedEngine.exe | 199.188.200.202:443 | www.stelybuilder.wtf | Namecheap, Inc. | US | suspicious |
1872 | RedEngine.exe | 66.171.248.178:80 | ipv4bot.whatismyipaddress.com | Alchemy Communications, Inc. | US | malicious |
Domain | IP | Reputation |
|---|---|---|
ipv4bot.whatismyipaddress.com |
| shared |
www.stelybuilder.wtf |
| unknown |
4.tcp.eu.ngrok.io |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1040 | svchost.exe | Potential Corporate Privacy Violation | AV POLICY Observed DNS Query for Suspicious TLD (.wtf) |
272 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a *.ngrok domain (ngrok.io) |
272 | svchost.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |
272 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a *.ngrok domain (ngrok.io) |
272 | svchost.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |
272 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a *.ngrok domain (ngrok.io) |
272 | svchost.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |
272 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a *.ngrok domain (ngrok.io) |
272 | svchost.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |
272 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a *.ngrok domain (ngrok.io) |