Threat name:
Raccoon Stealer v2, RedLine, Xmrig
Alert
Classification:
troj.adwa.spyw.evad.mine
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates files in the system32 config directory
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Potential malicious VBS script found (suspicious strings)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
726253
Sample:
file.exe
Startdate:
19/10/2022
Architecture:
WINDOWS
Score:
100
170
Snort IDS alert for
network traffic
2->170
172
Multi AV Scanner detection
for domain / URL
2->172
174
Malicious sample detected
(through community Yara
rule)
2->174
176
16 other signatures
2->176
11
file.exe
2->11
started
14
updater.exe
2->14
started
17
MoUSO.exe
2->17
started
process3
file4
224
Contains functionality
to inject code into
remote processes
11->224
226
Writes to foreign memory
regions
11->226
228
Allocates memory in
foreign processes
11->228
230
Injects a PE file into
a foreign processes
11->230
19
RegSvcs.exe
15
7
11->19
started
136
C:\Windows\Temp\6742.tmp, PE32+
14->136
dropped
138
C:\Windows\Temp\6136.tmp, PE32+
14->138
dropped
140
C:\Program Filesbehaviorgraphoogle\Libs\WR64.sys, PE32+
14->140
dropped
232
Query firmware table
information (likely
to detect VMs)
14->232
234
Modifies the context
of a thread in another
process (thread injection)
14->234
236
Adds a directory exclusion
to Windows Defender
14->236
246
3 other signatures
14->246
24
cmd.exe
14->24
started
26
powershell.exe
14->26
started
28
cmd.exe
14->28
started
30
powershell.exe
14->30
started
238
Multi AV Scanner detection
for dropped file
17->238
240
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
17->240
242
Tries to evade debugger
and weak emulator (self
modifying code)
17->242
244
Tries to detect virtualization
through RDTSC time measurements
17->244
signatures5
process6
dnsIp7
142
51.89.201.21, 49699, 7161
OVHFR
France
19->142
144
cdn.discordapp.com
162.159.130.233, 443, 49700, 49701
CLOUDFLARENETUS
United States
19->144
108
C:\Users\user\AppData\Local\Temp\setu2p.exe, PE32+
19->108
dropped
188
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
19->188
190
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
19->190
192
Tries to harvest and
steal browser information
(history, passwords,
etc)
19->192
194
Tries to steal Crypto
Currency Wallets
19->194
32
setu2p.exe
19->32
started
196
Modifies power options
to not sleep / hibernate
24->196
35
conhost.exe
24->35
started
37
powercfg.exe
24->37
started
47
2 other processes
24->47
198
Creates files in the
system32 config directory
26->198
39
conhost.exe
26->39
started
41
conhost.exe
28->41
started
43
sc.exe
28->43
started
49
3 other processes
28->49
45
conhost.exe
30->45
started
file8
signatures9
process10
signatures11
162
Hijacks the control
flow in another process
32->162
164
Writes to foreign memory
regions
32->164
166
Allocates memory in
foreign processes
32->166
168
2 other signatures
32->168
51
RegSvcs.exe
24
32->51
started
process12
dnsIp13
146
github.com
140.82.121.3, 443, 49707
GITHUBUS
United States
51->146
148
objects.githubusercontent.com
185.199.108.133, 443, 49708
FASTLYUS
Netherlands
51->148
150
cdn.discordapp.com
51->150
110
C:\Users\user\AppData\Local\...\watchdog.exe, PE32
51->110
dropped
112
C:\Users\user\AppData\Local\...\setup3221.exe, PE32
51->112
dropped
114
C:\Users\user\AppData\Local\...\setup32.exe, PE32+
51->114
dropped
116
5 other malicious files
51->116
dropped
55
setup32.exe
1
51->55
started
59
setup3221.exe
51->59
started
61
setup.exe
18
51->61
started
64
watchdog.exe
51->64
started
file14
process15
dnsIp16
118
C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+
55->118
dropped
120
C:\Windows\System32\drivers\etc\hosts, ISO-8859
55->120
dropped
200
Antivirus detection
for dropped file
55->200
202
Multi AV Scanner detection
for dropped file
55->202
204
Query firmware table
information (likely
to detect VMs)
55->204
220
4 other signatures
55->220
66
cmd.exe
55->66
started
69
cmd.exe
55->69
started
71
powershell.exe
55->71
started
85
2 other processes
55->85
122
C:\Windows\Temp\222.exe, PE32
59->122
dropped
206
Potential malicious
VBS script found (suspicious
strings)
59->206
208
Machine Learning detection
for dropped file
59->208
73
222.exe
59->73
started
76
wscript.exe
59->76
started
160
dba692117be7b6d3480fe5220fdd58b38bf.xyz
172.67.222.84, 443, 49704, 49705
CLOUDFLARENETUS
United States
61->160
124
C:\Users\user\AppData\Local\cache\MoUSO.exe, PE32
61->124
dropped
210
Detected unpacking (changes
PE section rights)
61->210
212
Found evasive API chain
(may stop execution
after checking mutex)
61->212
214
Performs DNS queries
to domains with low
reputation
61->214
222
4 other signatures
61->222
79
schtasks.exe
1
61->79
started
216
Writes to foreign memory
regions
64->216
218
Injects a PE file into
a foreign processes
64->218
81
vbc.exe
64->81
started
83
conhost.exe
64->83
started
file17
signatures18
process19
dnsIp20
178
Uses cmd line tools
excessively to alter
registry or file data
66->178
180
Uses powercfg.exe to
modify the power settings
66->180
182
Modifies power options
to not sleep / hibernate
66->182
87
conhost.exe
66->87
started
102
10 other processes
66->102
104
5 other processes
69->104
106
2 other processes
71->106
126
C:\Users\user\AppData\...\2.0.2-beta.exe, PE32
73->126
dropped
89
2.0.2-beta.exe
73->89
started
154
iplogger.com
148.251.234.93, 443, 49709
HETZNER-ASDE
Germany
76->154
184
System process connects
to network (likely due
to code injection or
exploit)
76->184
186
May check the online
IP address of the machine
76->186
94
conhost.exe
79->94
started
156
79.137.192.6, 49711, 49714, 8362
PSKSET-ASRU
Russian Federation
81->156
158
api.ip.sb
81->158
96
conhost.exe
81->96
started
98
conhost.exe
85->98
started
100
conhost.exe
85->100
started
file21
signatures22
process23
dnsIp24
152
77.73.133.7, 49710, 80
AS43260TR
Kazakhstan
89->152
128
C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32
89->128
dropped
130
C:\Users\user\AppData\LocalLow\softokn3.dll, PE32
89->130
dropped
132
C:\Users\user\AppData\LocalLow\nss3.dll, PE32
89->132
dropped
134
4 other files (2 malicious)
89->134
dropped
248
Antivirus detection
for dropped file
89->248
250
Multi AV Scanner detection
for dropped file
89->250
252
Tries to harvest and
steal browser information
(history, passwords,
etc)
89->252
254
Tries to steal Crypto
Currency Wallets
89->254
file25
signatures26
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.