Analysis
-
max time kernel
326s -
max time network
386s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
06-12-2020 19:00
Behavioral task
behavioral1
Sample
oxygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
oxygen.exe
Resource
win10v20201028
General
-
Target
oxygen.exe
-
Size
2.3MB
-
MD5
d06a5fcd65d93f6914e38387b946288d
-
SHA1
f016c0dca18a1fe92eabeef98796f0067bb54c7d
-
SHA256
c570eff61ea7f3cac3c6e044947b6500dbb774f454024814834400b818c76b45
-
SHA512
b8fa4f3305d94744e6850158dff8ef7bcedb7bddf53a6bd8f7035863c121e580c2287ea23528904ea78fb4c83e74fbe58a901800f476724f4b0340e3ab6a49b5
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
oxygen.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oxygen.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oxygen.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/744-3-0x0000000000F70000-0x0000000000F71000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
oxygen.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oxygen.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 checkip.amazonaws.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
oxygen.exepid process 744 oxygen.exe 744 oxygen.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
oxygen.exedescription pid process Token: SeDebugPrivilege 744 oxygen.exe