Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 10:11
Static task
static1
Behavioral task
behavioral1
Sample
f8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f8.exe
Resource
win10v2004-20230220-en
General
-
Target
f8.exe
-
Size
254KB
-
MD5
2610a0ddbea9da2319bda1005b9c26c9
-
SHA1
bd0abf0e85dbb443790134d31f82f7bb287c8120
-
SHA256
1d38b7669f2dcddcf429fef7dc3e37f613caffb8794f1b923b753ac6a38e4094
-
SHA512
307b95c9091a9181aca5cbddbf5c00ca78c7c16e8e85741952d352d415be482f144bbe2e48af384d39c0f414cde3dd21a6f3697bf8bcb23687511540046f77a3
-
SSDEEP
3072:YlRbncDRcLjlRbHrvUgxLx4kgKPsbGgOOZrce/a0G0zWgAiJQS2kOuZmVeDkgPxe:GBnyGlRkgxLxYT1dcktG03QS2mEVeQn
Malware Config
Extracted
redline
@ididjsjsid
94.142.138.4:80
-
auth_value
ff1308093e68aa6b7353aa8595fa3e75
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Detects Lobshot family 5 IoCs
resource yara_rule behavioral2/files/0x000e00000001da04-162.dat family_lobshot behavioral2/files/0x000e00000001da04-164.dat family_lobshot behavioral2/files/0x000e00000001da04-165.dat family_lobshot behavioral2/files/0x000d00000001da36-170.dat family_lobshot behavioral2/files/0x000d00000001da36-171.dat family_lobshot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation f8.exe -
Executes dropped EXE 4 IoCs
pid Process 2828 conhost.exe 744 svchost.exe 2184 service.exe 2520 ntlhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell Extension = "C:\\ProgramData\\service.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 45 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4928 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3408 f8.exe 3408 f8.exe 744 svchost.exe 744 svchost.exe 2184 service.exe 2184 service.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3408 f8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3408 wrote to memory of 2828 3408 f8.exe 91 PID 3408 wrote to memory of 2828 3408 f8.exe 91 PID 3408 wrote to memory of 744 3408 f8.exe 92 PID 3408 wrote to memory of 744 3408 f8.exe 92 PID 3408 wrote to memory of 744 3408 f8.exe 92 PID 744 wrote to memory of 3612 744 svchost.exe 93 PID 744 wrote to memory of 3612 744 svchost.exe 93 PID 744 wrote to memory of 3612 744 svchost.exe 93 PID 3612 wrote to memory of 4928 3612 cmd.exe 95 PID 3612 wrote to memory of 4928 3612 cmd.exe 95 PID 3612 wrote to memory of 4928 3612 cmd.exe 95 PID 3612 wrote to memory of 2184 3612 cmd.exe 97 PID 3612 wrote to memory of 2184 3612 cmd.exe 97 PID 3612 wrote to memory of 2184 3612 cmd.exe 97 PID 2828 wrote to memory of 2520 2828 conhost.exe 98 PID 2828 wrote to memory of 2520 2828 conhost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8.exe"C:\Users\Admin\AppData\Local\Temp\f8.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe3⤵
- Executes dropped EXE
PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")3⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:4928
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
731.1MB
MD5c16876d908747c9412abeed5e8df005a
SHA193f4b1c9c1602fd4229ad7056799255a3e08b187
SHA256228b0e7c5b8a89ee64d43f7ffecb09c1b96e6a164bca116087cb61e148f310a0
SHA5123620af64a8e7702cc77f1fb8d4371bcd719b85bde03a6058fc91803ed7980a1a12395cfdc1a41a5bcade339fc46aff08be510372987f5693f3b7f30f98ef9752
-
Filesize
731.2MB
MD53ceb5e5258be2f9767b42d589304ac9f
SHA17d184f3aa306d7265167c818f7d847fd221f9e13
SHA25695de505d6f11af27ffd88e22912ba623dfbe5f464947f1188ecee406677d4399
SHA51201ace7301072b72a919f2e49cbceaa2f017973c9231730efcbf3e9c0ea585fcc2770985a97ea3c13f321edc3c6908368f9e618353c935e5f10178b65fd982aea