Analysis
-
max time kernel
299s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 01:28
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
Installer.exe
-
Size
1.2MB
-
MD5
d017c52a55cb3741adfb83eed1d6f052
-
SHA1
fe3e79ad0cb2b2e5374dca688c83de93ebba9bb3
-
SHA256
aa8a2e7e1556276dad50729a039ac5cc81cd16494ecb4431f8d6ad59fa8eb9ec
-
SHA512
d207b117dc24f856d7ba385d4764f724940a59d1f56a3fd2abaf267e1dbc47234bc5cfce2765ac91b501fcd0925048bb22acc1f050e2c9c36c483581c2e1598d
-
SSDEEP
12288:dGKA3PekjU4fQHp4v8Q9SWVPs+ihQq/3C:dI3gNGUQcWVPBi6q/
Malware Config
Extracted
redline
@MerchD
94.142.138.4:80
-
auth_value
9f84b46959366b2efa0773e0556f6e11
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Detects Lobshot family 5 IoCs
resource yara_rule behavioral2/files/0x0006000000023163-159.dat family_lobshot behavioral2/files/0x0006000000023163-161.dat family_lobshot behavioral2/files/0x0006000000023163-162.dat family_lobshot behavioral2/files/0x0006000000023166-166.dat family_lobshot behavioral2/files/0x0006000000023166-167.dat family_lobshot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1960 conhost.exe 2260 svchost.exe 432 service.exe 3328 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell Extension = "C:\\ProgramData\\service.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5092 set thread context of 3996 5092 Installer.exe 82 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 32 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4512 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3996 InstallUtil.exe 3996 InstallUtil.exe 2260 svchost.exe 2260 svchost.exe 432 service.exe 432 service.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3996 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 5092 wrote to memory of 3996 5092 Installer.exe 82 PID 3996 wrote to memory of 1960 3996 InstallUtil.exe 89 PID 3996 wrote to memory of 1960 3996 InstallUtil.exe 89 PID 3996 wrote to memory of 2260 3996 InstallUtil.exe 90 PID 3996 wrote to memory of 2260 3996 InstallUtil.exe 90 PID 3996 wrote to memory of 2260 3996 InstallUtil.exe 90 PID 2260 wrote to memory of 2204 2260 svchost.exe 91 PID 2260 wrote to memory of 2204 2260 svchost.exe 91 PID 2260 wrote to memory of 2204 2260 svchost.exe 91 PID 2204 wrote to memory of 4512 2204 cmd.exe 93 PID 2204 wrote to memory of 4512 2204 cmd.exe 93 PID 2204 wrote to memory of 4512 2204 cmd.exe 93 PID 2204 wrote to memory of 432 2204 cmd.exe 94 PID 2204 wrote to memory of 432 2204 cmd.exe 94 PID 2204 wrote to memory of 432 2204 cmd.exe 94 PID 1960 wrote to memory of 3328 1960 conhost.exe 95 PID 1960 wrote to memory of 3328 1960 conhost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")4⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4512
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
817.0MB
MD593abed944a4462b69af992652284ddf7
SHA1c891ae060df7f8e761bec9305f5e8d8873432b70
SHA256aa44de201f339c430247feaa55635f5747827ee55983f7c7daa22d10fc87918b
SHA512b023fd69489970c37da84b738d2b7b1187690d6ebc762475eab9c80afbf376f236870292eb01e386029b4f23f00d8b6f3fc4491b41eac62843b5834b49df529a
-
Filesize
817.0MB
MD593abed944a4462b69af992652284ddf7
SHA1c891ae060df7f8e761bec9305f5e8d8873432b70
SHA256aa44de201f339c430247feaa55635f5747827ee55983f7c7daa22d10fc87918b
SHA512b023fd69489970c37da84b738d2b7b1187690d6ebc762475eab9c80afbf376f236870292eb01e386029b4f23f00d8b6f3fc4491b41eac62843b5834b49df529a