File name: | BLTools v2.2 [CRACKED BY INJUAN].zip |
Full analysis: | https://app.any.run/tasks/938e4436-fa9c-434f-a78c-e9bb8b00b97a |
Verdict: | Malicious activity |
Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
Analysis date: | April 01, 2023, 18:33:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 362C04480065325558DA753AF4879D43 |
SHA1: | 0D577DE150307C0F92991F3695B9CAAE0F05EB6D |
SHA256: | D2A468812E558977DBF2382B6388EB825FB4EAE4FB27B4E9462A42A4BF43E760 |
SSDEEP: | 49152:wyBDVKWToHBZ8Vacu+lOAw0oyV4uvKWKfewSGj1HrbWuO1fwWB:H5dTSqVpUAw0PV4u+dBH2z |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | Ookii.Dialogs.Wpf.dll |
---|---|
ZipUncompressedSize: | 105472 |
ZipCompressedSize: | 45202 |
ZipCRC: | 0x1d58dbac |
ZipModifyDate: | 2021:12:19 09:40:56 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2824 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\BLTools v2.2 [CRACKED BY INJUAN].zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
3720 | "C:\Users\admin\Desktop\BLTools v2.2.exe" | C:\Users\admin\Desktop\BLTools v2.2.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
1816 | "C:\Users\admin\Desktop\BLTools v2.2.exe" | C:\Users\admin\Desktop\BLTools v2.2.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
2368 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\BLTools.system.vbs" | C:\Windows\System32\wscript.exe | BLTools v2.2.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 Modules
| |||||||||||||||
2964 | "C:\Users\admin\AppData\Local\Temp\build.exe" | C:\Users\admin\AppData\Local\Temp\build.exe | BLTools v2.2.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Version: 0.0.0.0 Modules
RedLine(PID) Process(2964) build.exe US (151) Environment UNKNOWN . 1 cmyredmyit_cmyardmys my as21 \ Local State LocalPrefs.json Host Port : User Pass MANGO %USEWanaLifeRPROFILE%\AppDaWanaLifeta\LWanaLifeocal WanaLife Def Win String.Replace String.Remove windows-1251 AES Microsoft Primitive Provider ChainingModeGCM AuthTagLength ChainingMode ObjectLength KeyDataBlob BCrypt.BCryptImportKey() failed with status code:{0} BCrypt.BCryptGetProperty() (get size) failed with status code:{0} BCrypt.BCryptGetProperty() failed with status code:{0} - http:// / | Yandex\YaAddon xiiiolympus.hopto.org:1000 @XIIIOLYMPUS , asf *wallet* Armory \Armory *.wallet Atomic \atomic * ibnejdfjmmkpcnlpebklmnkoeoihofec Tronlink jbdaocneiiinmjbjlgalhcelgbejmnid NiftyWallet nkbihfbeogaeaoehlefnkodbefgpgknn Metamask afbcbjpbpfadlkmhmclhkeeodmamcflc MathWallet hnfanknocfeofbddgcijnmhnfnkdnaad Coinbase fhbohimaelbohpjbbldcngcnapndodjp BinanceChain odbfpeeihdkbihmopkbjmoonfanlbfcl BraveWallet hpglfhgfnhbgpjdenjgmdgoeiappafln GuardaWallet blnieiiffboillknjnepogjhkgnoapac EqualWallet cjelfplplebdjjenllpjcblmjkfcffne JaxxxLiberty fihkakfobkmkjojpchpfgcmhfjnmnfpi BitAppWallet kncchdigobghenbbaddojjnnaogfppfj iWallet amkmjjmmflddogmhpjloimipbofnfjih Wombat UnknownExtension _ Local Extension Settings Coinomi \Coinomi Profile_ Tel egram.exe \Telegram Desktop\tdata -*.lo--g 1*.1l1d1b String Replace System.UI File.IO *.json string.Replace Guarda \Guarda %USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng File.Write Handler npvo* %USERPstring.ReplaceROFILE%\Apstring.ReplacepData\Locastring.Replacel ToString ( UNIQUE " Width Height CopyFromScreen kernel32 user32.dll GetConsoleWindow ShowWindow SELECT * FROM Win32_Processor Name NumberOfCores root\CIMV2 SELECT * FROM Win32_VideoController AdapterRAM ROWindowsServiceOT\SecurityCenteWindowsServicer2 ROWindowsServiceOT\SecurWindowsServiceityCenter AntqueiresivirusProdqueiresuct AntqueiresiSpyqueiresWareProdqueiresuct FiqueiresrewallProqueiresduct WindowsService SELECT * FROM queires SOFTWARE\WOW6432Node\Clients\StartMenuInternet SOFTWARE\Clients\StartMenuInternet shell\open\command Unknown Version SELECT * FROM Win32_DiskDrive SerialNumber ' ExecutablePath [ ] 0 Mb or 0 SELECT * FROM Win32_OperatingSystem TotalVisibleMemorySize {0} MB or {1} x32 x64 x86 SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductName CSDVersion Unknown _[ Botnet@XIIIOLYMPUS C2 (1)xiiiolympus.hopto.org:1000 | |||||||||||||||
1204 | "C:\Users\admin\AppData\Local\Temp\BLTools v2.2.exe" | C:\Users\admin\AppData\Local\Temp\BLTools v2.2.exe | BLTools v2.2.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: BLTools Exit code: 3762504530 Version: 2.2.0.0 Modules
| |||||||||||||||
3936 | "C:\Users\admin\Desktop\BLTools v2.2.exe" | C:\Users\admin\Desktop\BLTools v2.2.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
3120 | "C:\Users\admin\Desktop\BLTools v2.2.exe" | C:\Users\admin\Desktop\BLTools v2.2.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
3232 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\BLTools.system.vbs" | C:\Windows\System32\wscript.exe | — | BLTools v2.2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 1 Version: 5.8.7600.16385 Modules
| |||||||||||||||
188 | "C:\Users\admin\AppData\Local\Temp\build.exe" | C:\Users\admin\AppData\Local\Temp\build.exe | — | BLTools v2.2.exe | |||||||||||
User: admin Integrity Level: HIGH Description: Version: 0.0.0.0 Modules
|
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
(PID) Process: | (2824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\Desktop |
PID | Process | Filename | Type | |
---|---|---|---|---|
1816 | BLTools v2.2.exe | C:\Users\admin\AppData\Local\Temp\BLTools.system.vbs | text | |
MD5:1D47083014CB1060DD1B0B48A41DDBB2 | SHA256:D8685C158551DB15F9D732CA7FA288AD4C9094EB0BE663789D20BA15B799C951 | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\BLTools v2.2.exe | executable | |
MD5:C5F00AD1E40B07A62D44A6E03856249F | SHA256:35059D9250CE74D1048175F7ABEA89B0946B57050E51E24B52DD1891A69064F6 | |||
1816 | BLTools v2.2.exe | C:\Users\admin\AppData\Local\Temp\build.exe | executable | |
MD5:B398A04CCDF336280B1F5ACD9C103053 | SHA256:B5EDAA5E18900C54E32BE21DDCBA01D97F830BBDA7C5679D9DE4F13ECAAC5B4A | |||
2368 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BLTools.system.vbs | text | |
MD5:1D47083014CB1060DD1B0B48A41DDBB2 | SHA256:D8685C158551DB15F9D732CA7FA288AD4C9094EB0BE663789D20BA15B799C951 | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\BouncyCastle.Crypto.dll | executable | |
MD5:3CF6BF0E0A27F3665EDD6362D137E4CC | SHA256:1985B85BB44BE6C6EAF35E02EF11E23A890E809B8EC2E53210A4AD5A85B26C70 | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\AlphaFS.dll | executable | |
MD5:F2F6F6798D306D6D7DF4267434B5C5F9 | SHA256:837F2CEAB6BBD9BC4BF076F1CB90B3158191888C3055DD2B78A1E23F1C3AAFDD | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\Settings.ini | text | |
MD5:AC450A5117532D56F9C117F2F2825B26 | SHA256:AD09D32E5BB4968039A5BC0C365AFF05760DE27B6E20642514A419B4025C8AA8 | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\RandomUserAgent.dll | executable | |
MD5:839CD4CE1930EEE45F55F6259468D649 | SHA256:53331BFF5E585C471FAD6789313A2A8A687A586CC0A8D006B24085B91ED7FC9A | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\Extreme.Net.dll | executable | |
MD5:F79F0E3A0361CAC000E2D3553753CD68 | SHA256:8A6518AB7419FBEC3AC9875BAA3AFB410AD1398C7AA622A09CD9084EC6CADFCD | |||
2824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2824.3015\Ookii.Dialogs.Wpf.dll | executable | |
MD5:932EBB3F9E7113071C6A17818342B7CC | SHA256:285AA8225732DDBCF211B1158BD6CFF8BF3ACBEEAB69617F4BE85862B7105AB5 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
900 | WerFault.exe | 104.208.16.93:443 | watson.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | suspicious |
Domain | IP | Reputation |
---|---|---|
xiiiolympus.hopto.org |
| malicious |
watson.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.hopto .org |