Analysis

  • max time kernel
    630s
  • max time network
    1768s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    28-10-2021 16:56

General

  • Target

    setup_x86_x64_install.exe

  • Size

    5MB

  • Sample

    211028-vfmssabhg4

  • MD5

    3ad67010f1d4a291524a848856543ec8

  • SHA1

    586eeb28c512f63371f1bb3fd2ff5014be13aecf

  • SHA256

    a65439ee7ce834a2fe1bbdbe3030c9221f02a0460ba510c41ea4f246de5ac439

  • SHA512

    86dba408b3cb93300a6d20f46216011e01bb6b0589984d22e338723beb266114ae07d9ede786189604fdaf9ce3c02d77639605f94d2b3c122031c3615d146e83

Malware Config

Extracted

Language ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Extracted

Family

redline

Botnet

sert23

C2

135.181.129.119:4805

Extracted

Family

redline

Botnet

chris

C2

194.104.136.5:46013

Extracted

Family

smokeloader

Version

2020

C2

http://brandyjaggers.com/upload/

http://andbal.com/upload/

http://alotofquotes.com/upload/

http://szpnc.cn/upload/

http://uggeboots.com/upload/

http://100klv.com/upload/

http://rapmusic.at/upload/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

41.6

Botnet

933

C2

https://mas.to/@lilocc

Attributes
profile_id
933

Signatures 66

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Modifies Windows Defender Real-time Protection settings ⋅ 3 TTPs
  • Process spawned unexpected child process ⋅ 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload ⋅ 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload ⋅ 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess ⋅ 3 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Checks for common network interception software ⋅ 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Grants admin privileges ⋅ 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) ⋅ 2 TTPs
  • Vidar Stealer ⋅ 2 IoCs
  • ASPack v2.12-2.42 ⋅ 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Blocklisted process makes network request ⋅ 62 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory ⋅ 2 IoCs
  • Executes dropped EXE ⋅ 64 IoCs
  • Modifies RDP port number used by Windows ⋅ 1 TTPs
  • Sets DLL path for service in the registry ⋅ 2 TTPs
  • Checks BIOS information in registry ⋅ 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings ⋅ 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself ⋅ 1 IoCs
  • Loads dropped DLL ⋅ 64 IoCs
  • Modifies file permissions ⋅ 1 TTPs 3 IoCs
  • Reads user/profile data of web browsers ⋅ 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting ⋅ 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting ⋅ 2 TTPs
  • Adds Run key to start application ⋅ 2 TTPs 13 IoCs
  • Checks installed software on the system ⋅ 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled ⋅ 1 TTPs 10 IoCs
  • Enumerates connected drives ⋅ 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 ⋅ 1 TTPs
  • Looks up external IP address via web service ⋅ 13 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory ⋅ 19 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger ⋅ 10 IoCs
  • Suspicious use of SetThreadContext ⋅ 14 IoCs
  • Drops file in Program Files directory ⋅ 38 IoCs
  • Drops file in Windows directory ⋅ 54 IoCs
  • Enumerates physical storage devices ⋅ 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash ⋅ 15 IoCs
  • Checks SCSI registry key(s) ⋅ 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry ⋅ 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) ⋅ 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe ⋅ 5 IoCs
  • Gathers network information ⋅ 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill ⋅ 13 IoCs
  • Modifies Internet Explorer settings ⋅ 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS ⋅ 64 IoCs
  • Modifies registry class ⋅ 56 IoCs