Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
16-06-2023 23:42
Static task
static1
Behavioral task
behavioral1
Sample
Set-up32Х64bit.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Set-up32Х64bit.exe
Resource
win10v2004-20230220-es
General
-
Target
Set-up32Х64bit.exe
-
Size
906.0MB
-
MD5
4e3fcd320f3c09ce853af113918939d5
-
SHA1
de2cb6ccbf2d91b5ffdd1091bab5ec20bb90aa2b
-
SHA256
18e658ec363968bf44dd6fcc8fb015a34441c346b8c196d0ae320173d48b98d0
-
SHA512
2f1cd98e4b822acacde9499b89cb0ca194eaee3deb8e1a8c1028d70811356c5ded156966b50c4aeb2489b88c2f88469fdb26a52e6f1920f8cdd38b8abc190ae7
-
SSDEEP
98304:x0A+OS/5mKctYIWOcNZE5JJKqEDkwhrrm5jMtunv:x0A05zH
Malware Config
Extracted
redline
@aboba255
94.142.138.4:80
-
auth_value
6487f4e00b6ec53f5fc436622f366458
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Detects Lobshot family 5 IoCs
resource yara_rule behavioral2/files/0x0003000000000731-229.dat family_lobshot behavioral2/files/0x0003000000000731-231.dat family_lobshot behavioral2/files/0x0003000000000731-232.dat family_lobshot behavioral2/files/0x0003000000000739-236.dat family_lobshot behavioral2/files/0x0003000000000739-237.dat family_lobshot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1116 conhost.exe 4968 svchost.exe 1108 service.exe 4884 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell Extension = "C:\\ProgramData\\service.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5092 set thread context of 2616 5092 Set-up32Х64bit.exe 82 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 51 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2616 MSBuild.exe 2616 MSBuild.exe 4968 svchost.exe 4968 svchost.exe 1108 service.exe 1108 service.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5092 Set-up32Х64bit.exe Token: SeDebugPrivilege 2616 MSBuild.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 5092 wrote to memory of 2616 5092 Set-up32Х64bit.exe 82 PID 2616 wrote to memory of 1116 2616 MSBuild.exe 84 PID 2616 wrote to memory of 1116 2616 MSBuild.exe 84 PID 2616 wrote to memory of 4968 2616 MSBuild.exe 85 PID 2616 wrote to memory of 4968 2616 MSBuild.exe 85 PID 2616 wrote to memory of 4968 2616 MSBuild.exe 85 PID 4968 wrote to memory of 3580 4968 svchost.exe 86 PID 4968 wrote to memory of 3580 4968 svchost.exe 86 PID 4968 wrote to memory of 3580 4968 svchost.exe 86 PID 3580 wrote to memory of 4988 3580 cmd.exe 88 PID 3580 wrote to memory of 4988 3580 cmd.exe 88 PID 3580 wrote to memory of 4988 3580 cmd.exe 88 PID 3580 wrote to memory of 1108 3580 cmd.exe 89 PID 3580 wrote to memory of 1108 3580 cmd.exe 89 PID 3580 wrote to memory of 1108 3580 cmd.exe 89 PID 1116 wrote to memory of 4884 1116 conhost.exe 90 PID 1116 wrote to memory of 4884 1116 conhost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set-up32Х64bit.exe"C:\Users\Admin\AppData\Local\Temp\Set-up32Х64bit.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")4⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4988
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
813.0MB
MD5ebc9d1ba895adaef7ad3f0a98ecca0d7
SHA101b0e4e0cd359eab011c19996c814258c54cf90e
SHA256e338595827420f92f1f1cd8ce7fdcb1a364efa242676cac12b5e39ab0cd5be32
SHA512df0550a89653926f950a358d0dc2a55ed91a297ca9ae5b227091e789aa883d29e4bb120a306345d91b2b392c671e31b9d9a0b95e3fd31cd5e2be71cb68fb0d45
-
Filesize
813.0MB
MD5ebc9d1ba895adaef7ad3f0a98ecca0d7
SHA101b0e4e0cd359eab011c19996c814258c54cf90e
SHA256e338595827420f92f1f1cd8ce7fdcb1a364efa242676cac12b5e39ab0cd5be32
SHA512df0550a89653926f950a358d0dc2a55ed91a297ca9ae5b227091e789aa883d29e4bb120a306345d91b2b392c671e31b9d9a0b95e3fd31cd5e2be71cb68fb0d45