Report - Ifum2.exe

RedLine stealer Malicious Library UPX AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2023.10.03 12:54 Machine s1_win7_x6403
Filename Ifum2.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
4
Behavior Score
7.4
ZERO API file : malware
VT API (file) 44 detected (AIDetectMalware, Lazy, Artemis, Redline, Vahd, GenusT, DPYT, Attribute, HighConfidence, malicious, high confidence, Kryptik, HUKQ, score, PWSX, Gencirc, Inject4, YXDJCZ, moderate, Stealerc, R600050, BScope, TrojanPSW, ai score=88, unsafe, Chgt, SmokeLoader, CLASSIC, wRMFLXYHnOE, ETFD, confidence)
md5 a7e5dd9ea31f866fdd0b425165f90915
sha256 d2608d6f7e2001cf70808e3c89bf702484c13f85ae19037a1de33fe957a3233a
ssdeep 24576:DpRaJkjIFluoFg9BA0/ho7svms7IcRvJ3:lnIFluoFgZho7XsDRvJ3
imphash 034f0d020ac1c43c0a84ba23dcd4c85a
impfuzzy 24:JA599VcpVW6OCrttlS1IGzplJBl3eDoLoEOovbO3OuFZMvMGMApTm+lEZHu9U:K599VcpVqCrttlS1IGzPpXc3euFZGiZ
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (14cnts)

Level Name Description Collection
danger RedLine_Stealer_m_Zero RedLine stealer memory
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

GDI32.dll
 0x486000 FloodFill
 0x486004 EndPage
USER32.dll
 0x486170 ReleaseDC
 0x486174 GetDC
KERNEL32.dll
 0x48600c CreateFileW
 0x486010 HeapSize
 0x486014 GetProcessHeap
 0x486018 Sleep
 0x48601c MultiByteToWideChar
 0x486020 FormatMessageA
 0x486024 GetStringTypeW
 0x486028 WideCharToMultiByte
 0x48602c EnterCriticalSection
 0x486030 LeaveCriticalSection
 0x486034 InitializeCriticalSectionEx
 0x486038 DeleteCriticalSection
 0x48603c EncodePointer
 0x486040 DecodePointer
 0x486044 LocalFree
 0x486048 GetLocaleInfoEx
 0x48604c LCMapStringEx
 0x486050 CompareStringEx
 0x486054 GetCPInfo
 0x486058 IsProcessorFeaturePresent
 0x48605c UnhandledExceptionFilter
 0x486060 SetUnhandledExceptionFilter
 0x486064 GetCurrentProcess
 0x486068 TerminateProcess
 0x48606c QueryPerformanceCounter
 0x486070 GetCurrentProcessId
 0x486074 GetCurrentThreadId
 0x486078 GetSystemTimeAsFileTime
 0x48607c InitializeSListHead
 0x486080 IsDebuggerPresent
 0x486084 GetStartupInfoW
 0x486088 GetModuleHandleW
 0x48608c SetStdHandle
 0x486090 RaiseException
 0x486094 RtlUnwind
 0x486098 InterlockedPushEntrySList
 0x48609c InterlockedFlushSList
 0x4860a0 GetLastError
 0x4860a4 SetLastError
 0x4860a8 InitializeCriticalSectionAndSpinCount
 0x4860ac TlsAlloc
 0x4860b0 TlsGetValue
 0x4860b4 TlsSetValue
 0x4860b8 TlsFree
 0x4860bc FreeLibrary
 0x4860c0 GetProcAddress
 0x4860c4 LoadLibraryExW
 0x4860c8 GetStdHandle
 0x4860cc WriteFile
 0x4860d0 GetModuleFileNameW
 0x4860d4 ExitProcess
 0x4860d8 GetModuleHandleExW
 0x4860dc GetCommandLineA
 0x4860e0 GetCommandLineW
 0x4860e4 HeapAlloc
 0x4860e8 HeapFree
 0x4860ec GetDateFormatW
 0x4860f0 GetTimeFormatW
 0x4860f4 CompareStringW
 0x4860f8 LCMapStringW
 0x4860fc GetLocaleInfoW
 0x486100 IsValidLocale
 0x486104 GetUserDefaultLCID
 0x486108 EnumSystemLocalesW
 0x48610c GetFileType
 0x486110 GetCurrentThread
 0x486114 CloseHandle
 0x486118 FlushFileBuffers
 0x48611c GetConsoleOutputCP
 0x486120 GetConsoleMode
 0x486124 ReadFile
 0x486128 GetFileSizeEx
 0x48612c SetFilePointerEx
 0x486130 ReadConsoleW
 0x486134 SetConsoleCtrlHandler
 0x486138 HeapReAlloc
 0x48613c GetTimeZoneInformation
 0x486140 OutputDebugStringW
 0x486144 FindClose
 0x486148 FindFirstFileExW
 0x48614c FindNextFileW
 0x486150 IsValidCodePage
 0x486154 GetACP
 0x486158 GetOEMCP
 0x48615c GetEnvironmentStringsW
 0x486160 FreeEnvironmentStringsW
 0x486164 SetEnvironmentVariableW
 0x486168 WriteConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure