File name:

red-v2.2-portable.zip

Full analysis: https://app.any.run/tasks/1e0542dd-2c3b-4792-a787-356196ea9489
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 26, 2025, 21:59:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
arch-exec
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

552BB8B3A4BA76082A9CB9ECCEA02556

SHA1:

00124046586AFD9CA21957363B00DA3C2E72CB9B

SHA256:

C3DCAF87A336EA2BF71A6E183D8C7BAE2923258A10586284CA23C985D2C688D5

SSDEEP:

1536:kCD97uUa/UOOOOIaETzRkEDy3i0ynZzRYCQXtJH4+CvKr6u1E1tH:a3/UOOOOIdzR1DUVgR+iKeu1E3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • RED2.exe (PID: 372)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2108)
    • Creates file in the systems drive root

      • RED2.exe (PID: 372)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2108)
    • Checks supported languages

      • RED2.exe (PID: 372)
    • Reads the machine GUID from the registry

      • RED2.exe (PID: 372)
    • Reads the computer name

      • RED2.exe (PID: 372)
    • Checks transactions between databases Windows and Oracle

      • RED2.exe (PID: 372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2011:02:06 20:06:42
ZipCRC: 0xac9b8d9b
ZipCompressedSize: 3431
ZipUncompressedSize: 7477
ZipFileName: credits.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe red2.exe Copy/Move/Rename/Delete/Link Object no specs

Process information

PID
CMD
Path
Indicators
Parent process
372"C:\Users\admin\AppData\Local\Temp\Rar$EXa2108.15680\RED2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2108.15680\RED2.exe
WinRAR.exe
User:
admin
Company:
Remove Empty Directories
Integrity Level:
MEDIUM
Description:
Remove Empty Directories
Version:
2.2.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2108.15680\red2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2108"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\red-v2.2-portable.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2588C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 821
Read events
1 799
Write events
21
Delete events
1

Modification events

(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\red-v2.2-portable.zip
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2108) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2108) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
Executable files
1
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2588dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$RX5W6H1.pak
MD5:
SHA256:
2108WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2108.15680\credits.txttext
MD5:642AF83A4A4285C64430D9B545F15B3E
SHA256:F387C554C0B847AB9BBF5C191911395A2F11C36091407A1F7FABE4F69C4B0209
2108WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2108.15680\license.txttext
MD5:B2710FCDE999160E97B4C25071897609
SHA256:1FC67A34BF6EB0C7576C8AB493D73B4FCF0AA48ADE4EF3C37AB5A5456C104926
2108WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2108.15680\RED2.exeexecutable
MD5:75F6CD0423C6ADB5640828FF7FBDAE19
SHA256:1F778ACC4D56B96437A084B9D8FB2DBEC6CB8AFB67E9D29FFA3653591ABFAA48
2588dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$IX5W6H1.pakbinary
MD5:87DDAD540F27CC9CAAB2B1F9A6CD6BD0
SHA256:82356B3D6909AAD945F13B28B5DA23F3CE599B6DE9AA9F7CD2B5A928F6B5DB48
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted

Threats

No threats detected
No debug info