General

  • Target

    oxygen.exe

  • Size

    2.3MB

  • Sample

    201206-qc1jcdtj4s

  • MD5

    d06a5fcd65d93f6914e38387b946288d

  • SHA1

    f016c0dca18a1fe92eabeef98796f0067bb54c7d

  • SHA256

    c570eff61ea7f3cac3c6e044947b6500dbb774f454024814834400b818c76b45

  • SHA512

    b8fa4f3305d94744e6850158dff8ef7bcedb7bddf53a6bd8f7035863c121e580c2287ea23528904ea78fb4c83e74fbe58a901800f476724f4b0340e3ab6a49b5

Malware Config

Targets

    • Target

      oxygen.exe

    • Size

      2.3MB

    • MD5

      d06a5fcd65d93f6914e38387b946288d

    • SHA1

      f016c0dca18a1fe92eabeef98796f0067bb54c7d

    • SHA256

      c570eff61ea7f3cac3c6e044947b6500dbb774f454024814834400b818c76b45

    • SHA512

      b8fa4f3305d94744e6850158dff8ef7bcedb7bddf53a6bd8f7035863c121e580c2287ea23528904ea78fb4c83e74fbe58a901800f476724f4b0340e3ab6a49b5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • themida

      Detects Themida, Advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks