Report - 11.exe

RedLine stealer[m] Malicious Library UPX AntiDebug AntiVM PE32 OS Processor Check PE File
ScreenShot
Created 2022.12.12 09:42 Machine s1_win7_x6403
Filename 11.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
11.4
ZERO API file : malware
VT API (file) 20 detected (Unsafe, Attribute, HighConfidence, malicious, high confidence, score, Reline, PWSX, StealerNET, high, AGEN, Sabsik, ua3vGMabA0L, Mokes, ZexaF, tuY@a4AoIPli, confidence)
md5 d718535b14065b8645d4c3310451a67e
sha256 622018b4ba76871cc14437cf779a5b842b66b324ad3da1bf9cff13ed54a4bf28
ssdeep 6144:Ve7GIU+3MmZNr7rSXuvXOrdaSsz6TU/Qgc:Ve7GIU+3hIrdPsz1Qn
imphash d71d7fdd44a947be9fe6de2a6620b3f7
impfuzzy 24:9bj3EOZS1jtYGhlJnc+pl3eDo/YoOovSkPvRRZHu9oGM5:9bHZS1jtYG5c+ppsnunF
  Network IP location

Signature (25cnts)

Level Description
danger Executed a process and injected code into it
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to create or modify system certificates
watch Collects information about installed applications
watch Harvests credentials from local FTP client softwares
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (14cnts)

Level Name Description Collection
danger RedLine_Stealer_m_Zero RedLine stealer memory
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://api.ip.sb/ip US CLOUDFLARENET 172.67.75.172 clean
manddarinn.art Unknown 147.182.160.227 clean
api.ip.sb US CLOUDFLARENET 172.67.75.172 clean
147.182.160.227 Unknown 147.182.160.227 clean
172.67.75.172 US CLOUDFLARENET 172.67.75.172 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

SHELL32.dll
 0x417120 CommandLineToArgvW
 0x417124 SHGetFolderPathAndSubDirW
GDI32.dll
 0x417000 GetPolyFillMode
 0x417004 ArcTo
KERNEL32.dll
 0x41700c CreateFileW
 0x417010 WriteConsoleW
 0x417014 GetModuleHandleExW
 0x417018 GetCommandLineW
 0x41701c LocalFree
 0x417020 QueryPerformanceCounter
 0x417024 GetCurrentProcessId
 0x417028 GetCurrentThreadId
 0x41702c GetSystemTimeAsFileTime
 0x417030 InitializeSListHead
 0x417034 IsDebuggerPresent
 0x417038 UnhandledExceptionFilter
 0x41703c SetUnhandledExceptionFilter
 0x417040 GetStartupInfoW
 0x417044 IsProcessorFeaturePresent
 0x417048 GetModuleHandleW
 0x41704c GetCurrentProcess
 0x417050 TerminateProcess
 0x417054 RaiseException
 0x417058 RtlUnwind
 0x41705c GetLastError
 0x417060 SetLastError
 0x417064 EnterCriticalSection
 0x417068 LeaveCriticalSection
 0x41706c DeleteCriticalSection
 0x417070 InitializeCriticalSectionAndSpinCount
 0x417074 TlsAlloc
 0x417078 TlsGetValue
 0x41707c TlsSetValue
 0x417080 TlsFree
 0x417084 FreeLibrary
 0x417088 GetProcAddress
 0x41708c LoadLibraryExW
 0x417090 EncodePointer
 0x417094 GetStdHandle
 0x417098 WriteFile
 0x41709c GetModuleFileNameW
 0x4170a0 ExitProcess
 0x4170a4 DecodePointer
 0x4170a8 GetCommandLineA
 0x4170ac HeapAlloc
 0x4170b0 HeapFree
 0x4170b4 CompareStringW
 0x4170b8 LCMapStringW
 0x4170bc GetFileType
 0x4170c0 FindClose
 0x4170c4 FindFirstFileExW
 0x4170c8 FindNextFileW
 0x4170cc IsValidCodePage
 0x4170d0 GetACP
 0x4170d4 GetOEMCP
 0x4170d8 GetCPInfo
 0x4170dc MultiByteToWideChar
 0x4170e0 WideCharToMultiByte
 0x4170e4 GetEnvironmentStringsW
 0x4170e8 FreeEnvironmentStringsW
 0x4170ec SetEnvironmentVariableW
 0x4170f0 SetStdHandle
 0x4170f4 GetStringTypeW
 0x4170f8 GetProcessHeap
 0x4170fc FlushFileBuffers
 0x417100 GetConsoleOutputCP
 0x417104 GetConsoleMode
 0x417108 GetFileSizeEx
 0x41710c SetFilePointerEx
 0x417110 HeapSize
 0x417114 HeapReAlloc
 0x417118 CloseHandle

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure