Analysis

  • max time kernel
    154s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    16-06-2023 23:42

General

  • Target

    Set-up32Х64bit.exe

  • Size

    906.0MB

  • MD5

    4e3fcd320f3c09ce853af113918939d5

  • SHA1

    de2cb6ccbf2d91b5ffdd1091bab5ec20bb90aa2b

  • SHA256

    18e658ec363968bf44dd6fcc8fb015a34441c346b8c196d0ae320173d48b98d0

  • SHA512

    2f1cd98e4b822acacde9499b89cb0ca194eaee3deb8e1a8c1028d70811356c5ded156966b50c4aeb2489b88c2f88469fdb26a52e6f1920f8cdd38b8abc190ae7

  • SSDEEP

    98304:x0A+OS/5mKctYIWOcNZE5JJKqEDkwhrrm5jMtunv:x0A05zH

Malware Config

Extracted

Family

redline

Botnet

@aboba255

C2

94.142.138.4:80

Attributes
  • auth_value

    6487f4e00b6ec53f5fc436622f366458

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Detects Lobshot family 5 IoCs
  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Lobshot

    Lobshot is a backdoor module written in c++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Set-up32Х64bit.exe
    "C:\Users\Admin\AppData\Local\Temp\Set-up32Х64bit.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\conhost.exe
        "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Executes dropped EXE
          PID:4884
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3580
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            5⤵
            • Runs ping.exe
            PID:4988
          • C:\ProgramData\service.exe
            "C:\ProgramData\service.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\service.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\ProgramData\service.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    813.0MB

    MD5

    ebc9d1ba895adaef7ad3f0a98ecca0d7

    SHA1

    01b0e4e0cd359eab011c19996c814258c54cf90e

    SHA256

    e338595827420f92f1f1cd8ce7fdcb1a364efa242676cac12b5e39ab0cd5be32

    SHA512

    df0550a89653926f950a358d0dc2a55ed91a297ca9ae5b227091e789aa883d29e4bb120a306345d91b2b392c671e31b9d9a0b95e3fd31cd5e2be71cb68fb0d45

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    813.0MB

    MD5

    ebc9d1ba895adaef7ad3f0a98ecca0d7

    SHA1

    01b0e4e0cd359eab011c19996c814258c54cf90e

    SHA256

    e338595827420f92f1f1cd8ce7fdcb1a364efa242676cac12b5e39ab0cd5be32

    SHA512

    df0550a89653926f950a358d0dc2a55ed91a297ca9ae5b227091e789aa883d29e4bb120a306345d91b2b392c671e31b9d9a0b95e3fd31cd5e2be71cb68fb0d45

  • memory/2616-215-0x000000000F880000-0x000000000FDAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2616-216-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/2616-200-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2616-214-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/2616-213-0x000000000F180000-0x000000000F342000-memory.dmp

    Filesize

    1.8MB

  • memory/2616-212-0x000000000E5B0000-0x000000000E600000-memory.dmp

    Filesize

    320KB

  • memory/2616-211-0x000000000E3C0000-0x000000000E426000-memory.dmp

    Filesize

    408KB

  • memory/2616-210-0x000000000E460000-0x000000000E562000-memory.dmp

    Filesize

    1.0MB

  • memory/2616-209-0x000000000E900000-0x000000000EEA4000-memory.dmp

    Filesize

    5.6MB

  • memory/2616-208-0x000000000DE40000-0x000000000DED2000-memory.dmp

    Filesize

    584KB

  • memory/2616-207-0x000000000DD20000-0x000000000DD96000-memory.dmp

    Filesize

    472KB

  • memory/2616-206-0x000000000B0A0000-0x000000000B0C0000-memory.dmp

    Filesize

    128KB

  • memory/2616-205-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/2616-204-0x000000000D190000-0x000000000D1CC000-memory.dmp

    Filesize

    240KB

  • memory/2616-203-0x000000000D130000-0x000000000D142000-memory.dmp

    Filesize

    72KB

  • memory/2616-202-0x000000000D1E0000-0x000000000D2EA000-memory.dmp

    Filesize

    1.0MB

  • memory/2616-201-0x000000000B850000-0x000000000BE68000-memory.dmp

    Filesize

    6.1MB

  • memory/5092-161-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-165-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-189-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-191-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-193-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-195-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-197-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-185-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-183-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-181-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-179-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-177-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-173-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-175-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-171-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-169-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-167-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-187-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-163-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-133-0x0000000000F70000-0x0000000001102000-memory.dmp

    Filesize

    1.6MB

  • memory/5092-159-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-157-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-155-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-153-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-151-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-149-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-147-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-145-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-143-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-141-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-139-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-137-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-135-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB

  • memory/5092-134-0x00000000033E0000-0x0000000003467000-memory.dmp

    Filesize

    540KB