| File name: | Cibersity.exe |
| Full analysis: | https://app.any.run/tasks/3231e09f-222c-43a5-a381-ca2259df29f3 |
| Verdict: | Malicious activity |
| Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
| Analysis date: | January 07, 2024, 04:07:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | A3619854525630026F2DF50838380682 |
| SHA1: | 2010067183D7F92C1026D72F6473B85A2E5DC739 |
| SHA256: | C8F7CEF323792B6B8BF74024704AD6ADD92B48D81C853B6CF41456BCC3519B10 |
| SSDEEP: | 98304:kY3YoG2UIhpgIlWR3CZXu4w+S+GHETjHlR6a1+p+fisAu9EByO+4lB2eMNpEAc7V:KGX |
| .dll | | | Win32 Dynamic Link Library (generic) (43.5) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (29.8) |
| .exe | | | Generic Win/DOS Executable (13.2) |
| .exe | | | DOS Executable Generic (13.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2088:11:16 00:07:22+01:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 188928 |
| InitializedDataSize: | 1361920 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x5d2d68 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.3.6.0 |
| ProductVersionNumber: | 2.3.6.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | Ensamblado AplicacionCibersity |
| CompanyName: | Grupo Futuver |
| FileDescription: | AplicacionCibersity |
| FileVersion: | 2.3.6.0 |
| InternalName: | Cibersity.exe |
| LegalCopyright: | Copyright Futuver 2018 |
| LegalTrademarks: | Futuver |
| OriginalFileName: | Cibersity.exe |
| ProductName: | CIBERSITY |
| ProductVersion: | 2.3.6.0 |
| AssemblyVersion: | 2.3.6.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2040 | "C:\Users\admin\Desktop\Cibersity.exe" | C:\Users\admin\Desktop\Cibersity.exe | explorer.exe | ||||||||||||
User: admin Company: Grupo Futuver Integrity Level: MEDIUM Description: AplicacionCibersity Exit code: 0 Version: 2.3.6.0 Modules
RedLine(PID) Process(2040) Cibersity.exe C2 (1)91.92.245.15:80 Botnet24k Options ErrorMessage Keys XorZodiacal | |||||||||||||||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | RegFilesHash |
Value: EFFFEBAE5FF62A6E368D565475AEB6539B7BEDB57FC98C4818A958087FB65C2F | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | RegFiles0000 |
Value: C:\Users\admin\AppData\Local\Google\Chrome\User Data\lockfile | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | SessionHash |
Value: 30F5B576063C957C39F90D8E730F78347FE9B6B4DDD4B153FF698A6032FA422A | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | Owner |
Value: F80700009EB7591E1F41DA01 | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | RegFilesHash |
Value: DB6109A70A666DF450A7B4293CAC0C6AD8F6D38507A1D3E112BE2AD29A6580BB | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | RegFiles0000 |
Value: C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\lockfile | |||
| (PID) Process: | (2040) Cibersity.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | SessionHash |
Value: E6AD51D7B020BC59A73FAF2686378B3D5215D9BFE7BA4E9856FCAD491F0A0DB7 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2040 | Cibersity.exe | 91.92.245.15:80 | — | Natskovi & Sie Ltd. | BG | malicious |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2040 | Cibersity.exe | 104.26.12.31:443 | api.ip.sb | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
api.ip.sb |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2040 | Cibersity.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
2040 | Cibersity.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 7 |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization) |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2040 | Cibersity.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |