ScreenShot
Created | 2023.09.27 17:39 | Machine | s1_win7_x6401 |
Filename | asca1ex.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 57 detected (Common, Malicious, score, GenericKD, RedLineStealer, V1wl, Genus, ABRisk, FOEH, Kryptik, HUSP, euxa, kbeids, PWSX, Gencirc, mbimb, RedLineNET, AMADEY, YXDIWZ, Artemis, high, Static AI, Malicious PE, GenKD, Sabsik, RedLine, Malware@#30n3dhrj4hb6i, RDDI, Detected, ZexaF, zyY@a4TN2mni, ai score=88, TrojanPSW, unsafe, BZinTisDkOC, dYWTXrGLlrU, Qakbot, susgen, PossibleThreat, confidence, 100%) | ||
md5 | bf58b6afac98febc716a85be5b8e9d9e | ||
sha256 | 16b88051fd1e27d08d1408bb51002dd25edb88292807a92ee25ba5f4c0895b8d | ||
ssdeep | 12288:zKtCclgms3mGmGmGmuuDLc36h65QoZ5MEK2sq:GR2mGmGmGm06h6w2sq | ||
imphash | 9a27b05ceaf94172ed30a41e9748fab9 | ||
impfuzzy | 24:WjKNDoryqjOovnKQFQ8RyvDh/J3ISlRT4Rffjl2wV:dEK3DjhcRffjMwV |
Network IP location
Signature (16cnts)
Level | Description |
---|---|
danger | File has been identified by 57 AntiVirus engines on VirusTotal as malicious |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Harvests credentials from local FTP client softwares |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | One or more potentially interesting buffers were extracted |
notice | Queries for potentially installed applications |
notice | Steals private information from local Internet browsers |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Suricata ids
ET INFO Microsoft net.tcp Connection Initialization Activity
ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization)
ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound)
ET MALWARE Redline Stealer Activity (Response)
ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization)
ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound)
ET MALWARE Redline Stealer Activity (Response)
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x40b000 WaitForSingleObject
0x40b004 Sleep
0x40b008 CreateThread
0x40b00c lstrlenW
0x40b010 VirtualProtect
0x40b014 GetProcAddress
0x40b018 LoadLibraryA
0x40b01c VirtualAlloc
0x40b020 LockResource
0x40b024 LoadResource
0x40b028 SizeofResource
0x40b02c FindResourceW
0x40b030 GetModuleHandleW
0x40b034 GetLastError
0x40b038 CreateMutexA
0x40b03c GetModuleHandleA
0x40b040 FindFirstVolumeW
0x40b044 FreeConsole
0x40b048 GetCommandLineA
0x40b04c SetUnhandledExceptionFilter
0x40b050 ExitProcess
0x40b054 WriteFile
0x40b058 GetStdHandle
0x40b05c GetModuleFileNameA
0x40b060 FreeEnvironmentStringsA
0x40b064 GetEnvironmentStrings
0x40b068 FreeEnvironmentStringsW
0x40b06c WideCharToMultiByte
0x40b070 GetEnvironmentStringsW
0x40b074 SetHandleCount
0x40b078 GetFileType
0x40b07c GetStartupInfoA
0x40b080 DeleteCriticalSection
0x40b084 TlsGetValue
0x40b088 TlsAlloc
0x40b08c TlsSetValue
0x40b090 TlsFree
0x40b094 InterlockedIncrement
0x40b098 SetLastError
0x40b09c GetCurrentThreadId
0x40b0a0 InterlockedDecrement
0x40b0a4 HeapCreate
0x40b0a8 VirtualFree
0x40b0ac HeapFree
0x40b0b0 QueryPerformanceCounter
0x40b0b4 GetTickCount
0x40b0b8 GetCurrentProcessId
0x40b0bc GetSystemTimeAsFileTime
0x40b0c0 LeaveCriticalSection
0x40b0c4 EnterCriticalSection
0x40b0c8 TerminateProcess
0x40b0cc GetCurrentProcess
0x40b0d0 UnhandledExceptionFilter
0x40b0d4 IsDebuggerPresent
0x40b0d8 InitializeCriticalSectionAndSpinCount
0x40b0dc GetCPInfo
0x40b0e0 GetACP
0x40b0e4 GetOEMCP
0x40b0e8 IsValidCodePage
0x40b0ec HeapAlloc
0x40b0f0 HeapReAlloc
0x40b0f4 RtlUnwind
0x40b0f8 HeapSize
0x40b0fc GetLocaleInfoA
0x40b100 LCMapStringA
0x40b104 MultiByteToWideChar
0x40b108 LCMapStringW
0x40b10c GetStringTypeA
0x40b110 GetStringTypeW
EAT(Export Address Table) is none
KERNEL32.dll
0x40b000 WaitForSingleObject
0x40b004 Sleep
0x40b008 CreateThread
0x40b00c lstrlenW
0x40b010 VirtualProtect
0x40b014 GetProcAddress
0x40b018 LoadLibraryA
0x40b01c VirtualAlloc
0x40b020 LockResource
0x40b024 LoadResource
0x40b028 SizeofResource
0x40b02c FindResourceW
0x40b030 GetModuleHandleW
0x40b034 GetLastError
0x40b038 CreateMutexA
0x40b03c GetModuleHandleA
0x40b040 FindFirstVolumeW
0x40b044 FreeConsole
0x40b048 GetCommandLineA
0x40b04c SetUnhandledExceptionFilter
0x40b050 ExitProcess
0x40b054 WriteFile
0x40b058 GetStdHandle
0x40b05c GetModuleFileNameA
0x40b060 FreeEnvironmentStringsA
0x40b064 GetEnvironmentStrings
0x40b068 FreeEnvironmentStringsW
0x40b06c WideCharToMultiByte
0x40b070 GetEnvironmentStringsW
0x40b074 SetHandleCount
0x40b078 GetFileType
0x40b07c GetStartupInfoA
0x40b080 DeleteCriticalSection
0x40b084 TlsGetValue
0x40b088 TlsAlloc
0x40b08c TlsSetValue
0x40b090 TlsFree
0x40b094 InterlockedIncrement
0x40b098 SetLastError
0x40b09c GetCurrentThreadId
0x40b0a0 InterlockedDecrement
0x40b0a4 HeapCreate
0x40b0a8 VirtualFree
0x40b0ac HeapFree
0x40b0b0 QueryPerformanceCounter
0x40b0b4 GetTickCount
0x40b0b8 GetCurrentProcessId
0x40b0bc GetSystemTimeAsFileTime
0x40b0c0 LeaveCriticalSection
0x40b0c4 EnterCriticalSection
0x40b0c8 TerminateProcess
0x40b0cc GetCurrentProcess
0x40b0d0 UnhandledExceptionFilter
0x40b0d4 IsDebuggerPresent
0x40b0d8 InitializeCriticalSectionAndSpinCount
0x40b0dc GetCPInfo
0x40b0e0 GetACP
0x40b0e4 GetOEMCP
0x40b0e8 IsValidCodePage
0x40b0ec HeapAlloc
0x40b0f0 HeapReAlloc
0x40b0f4 RtlUnwind
0x40b0f8 HeapSize
0x40b0fc GetLocaleInfoA
0x40b100 LCMapStringA
0x40b104 MultiByteToWideChar
0x40b108 LCMapStringW
0x40b10c GetStringTypeA
0x40b110 GetStringTypeW
EAT(Export Address Table) is none