Analysis

  • max time kernel
    110s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2023 01:27

General

  • Target

    8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe

  • Size

    2.3MB

  • MD5

    623bca798c05a1e5dc5a26ff57329459

  • SHA1

    5d3db9376a7581fad4db73b87bcf6ce555e6138b

  • SHA256

    8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c

  • SHA512

    1923e4bf43651cd2423275d4383b013dbbe0f05870245229d6bd6ca650c536368f44d4b72cd9ca393b4269c88f5d4954826a4d1042144c5053140f463f54032d

  • SSDEEP

    49152:magq7j1kTKNpT+1OzKamfw3Fryxqu4m/YjsqV51RoipOm5FGWCmP9:Zgq7STKNUA7mfEO4cYjsq1RoinZCml

Malware Config

Extracted

Family

redline

Botnet

170723_rc_11

C2

rcam17.tuktuk.ug:11290

Attributes
  • auth_value

    ddbd29a91f6321652fef2b14e5ac70d5

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe
    "C:\Users\Admin\AppData\Local\Temp\8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Users\Admin\AppData\Local\Temp\Octium.exe
        "C:\Users\Admin\AppData\Local\Temp\Octium.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:4016
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
            PID:2452
        • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe
          "C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Octium.exe

      Filesize

      4.0MB

      MD5

      e1cd1c30f4761a2bf4c878ef0a723435

      SHA1

      8fe5aaf4f0906bbc33c73819fd27eb838cc096e0

      SHA256

      b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6

      SHA512

      ecf459342f3d6aa775fa471e9b80d457a8a6bdaae18ffe0495fb044c1a665bd6efcfe9fbf27f8e977939797b1caff468e3b5e2a41b433f080e7b63c7fc8d32d8

    • C:\Users\Admin\AppData\Local\Temp\Octium.exe

      Filesize

      4.0MB

      MD5

      e1cd1c30f4761a2bf4c878ef0a723435

      SHA1

      8fe5aaf4f0906bbc33c73819fd27eb838cc096e0

      SHA256

      b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6

      SHA512

      ecf459342f3d6aa775fa471e9b80d457a8a6bdaae18ffe0495fb044c1a665bd6efcfe9fbf27f8e977939797b1caff468e3b5e2a41b433f080e7b63c7fc8d32d8

    • C:\Users\Admin\AppData\Local\Temp\Octium.exe

      Filesize

      4.0MB

      MD5

      e1cd1c30f4761a2bf4c878ef0a723435

      SHA1

      8fe5aaf4f0906bbc33c73819fd27eb838cc096e0

      SHA256

      b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6

      SHA512

      ecf459342f3d6aa775fa471e9b80d457a8a6bdaae18ffe0495fb044c1a665bd6efcfe9fbf27f8e977939797b1caff468e3b5e2a41b433f080e7b63c7fc8d32d8

    • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

      Filesize

      9.2MB

      MD5

      c74b706ecaa058e6e71e7b4b64dff9df

      SHA1

      5fa641b867716e397c449a7eeae77e37a0c8c804

      SHA256

      c2520a713db1ddda557dc6d4ace41e12d02bde143df9275e5fcc48a0fea8a21f

      SHA512

      ab3b626c27dfaf1b991a3f2650e5c0896f248eed4b10ff903047f63fe72874229138c85615ab063904654b2abc0226ad7e7151148b09731dd761a527a8e4a591

    • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

      Filesize

      9.1MB

      MD5

      8a0d94eb1fed2d21eecf7edebbdf3a6d

      SHA1

      6bd0d3bc85896fa7e90f7b0879e432ed894a453a

      SHA256

      1f4eeef23e2010c941ba90a7f3e05fa1c07de289838ce2ee9dac74469e47b92f

      SHA512

      2f9632145c8eea9e6eb2051210916a5d9cfe7281b904934c1990a334baaeb8917b84c33b1131f582d47698f5ccba44b0c4f7a1de3954be25eb7875ac464b860d

    • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

      Filesize

      7.9MB

      MD5

      b3d91c1851d9ee1d9fdcb130327d5d1e

      SHA1

      b229b4f5d66aa2fe789e80c949c20cf5f9ad4b44

      SHA256

      aa6af47ac58c206ee3f80dd637624a08379770a24857e1fc3d29b939360572ca

      SHA512

      c0f84af368017ee7a7459ce015fc163dca0805c2bce1583044bca4472c137c334f9b1810fcc2f6630d897b8678e68e15b93d455f96ba7fa94e65546a97fafbaa

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      4.8MB

      MD5

      f72c71fdd017ae2686da530089e96e47

      SHA1

      6b8a81634c94de3d3052e2645f55552b38186f9f

      SHA256

      f78e97a3dd38a2165f6a9931bfbeae03810ea53374ba5f3469a048b6e9afe2ba

      SHA512

      19eb3be3cb63174def8616ad0b07411c18063d36e3ce1041d18f914369ddf9847470feab7009b76fc8b6d222a1427bd688a59e789b531441a8623f9641133791

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      4.9MB

      MD5

      36d1b48b8a3e7df53d2168278b863cb5

      SHA1

      b365d0178438b2d3b6cd4778b210d2846bca781e

      SHA256

      f2bca1cabea4f3035a05a928d93b568564b7bc41f4ecd5787eda6572a40fe0e0

      SHA512

      9df88ca507dd826a87b1cdf2b18a6575eecb76ef9b359e5254ff5ba9a02b1dc82fb3763a33a7c64641f5bbb3127af37c915a46bf89ce20215a0d0d776930d521

    • memory/644-160-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-170-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-146-0x0000000005520000-0x00000000055BC000-memory.dmp

      Filesize

      624KB

    • memory/644-148-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-149-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-150-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-157-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-158-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-144-0x0000000000870000-0x0000000000E40000-memory.dmp

      Filesize

      5.8MB

    • memory/644-162-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-164-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-166-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-168-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-145-0x0000000000870000-0x0000000000E40000-memory.dmp

      Filesize

      5.8MB

    • memory/644-172-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-174-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-176-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-178-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-180-0x0000000003310000-0x0000000003325000-memory.dmp

      Filesize

      84KB

    • memory/644-185-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-186-0x0000000000870000-0x0000000000E40000-memory.dmp

      Filesize

      5.8MB

    • memory/644-140-0x00000000773A4000-0x00000000773A6000-memory.dmp

      Filesize

      8KB

    • memory/644-139-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-138-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-137-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/644-136-0x0000000000870000-0x0000000000E40000-memory.dmp

      Filesize

      5.8MB

    • memory/2452-269-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-251-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-262-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-261-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-260-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-259-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-258-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-257-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-256-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-255-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-254-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-253-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/2452-264-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-263-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-266-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-267-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/2452-268-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/2452-271-0x0000000000AA0000-0x00000000013FE000-memory.dmp

      Filesize

      9.4MB

    • memory/3752-236-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-246-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/3752-245-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-230-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-232-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/3752-233-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-240-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-239-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-238-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/3752-237-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp

      Filesize

      16.5MB

    • memory/4016-219-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-217-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-211-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-212-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/4016-213-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-235-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-242-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-243-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-244-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/4016-229-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-227-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-225-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-223-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-250-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-220-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4016-252-0x00007FFE30470000-0x00007FFE30665000-memory.dmp

      Filesize

      2.0MB

    • memory/4016-218-0x00000000004F0000-0x0000000000E4E000-memory.dmp

      Filesize

      9.4MB

    • memory/4616-234-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4616-197-0x000000000B290000-0x000000000B2F6000-memory.dmp

      Filesize

      408KB

    • memory/4616-198-0x000000000CA40000-0x000000000CC02000-memory.dmp

      Filesize

      1.8MB

    • memory/4616-199-0x000000000D140000-0x000000000D66C000-memory.dmp

      Filesize

      5.2MB

    • memory/4616-196-0x000000000B640000-0x000000000BBE4000-memory.dmp

      Filesize

      5.6MB

    • memory/4616-195-0x000000000A9B0000-0x000000000AA42000-memory.dmp

      Filesize

      584KB

    • memory/4616-194-0x000000000A890000-0x000000000A906000-memory.dmp

      Filesize

      472KB

    • memory/4616-193-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/4616-192-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4616-191-0x000000000A560000-0x000000000A59C000-memory.dmp

      Filesize

      240KB

    • memory/4616-190-0x000000000A500000-0x000000000A512000-memory.dmp

      Filesize

      72KB

    • memory/4616-189-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/4616-188-0x000000000A5C0000-0x000000000A6CA000-memory.dmp

      Filesize

      1.0MB

    • memory/4616-187-0x000000000AA70000-0x000000000B088000-memory.dmp

      Filesize

      6.1MB

    • memory/4616-183-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4616-181-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB