Threat name:
Cryptbot, RHADAMANTHYS, RedLine
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Encrypted powershell cmdline option found
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected RHADAMANTHYS Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
798412
Sample:
file.exe
Startdate:
04/02/2023
Architecture:
WINDOWS
Score:
100
121
api.ip.sb
2->121
157
Snort IDS alert for
network traffic
2->157
159
Malicious sample detected
(through community Yara
rule)
2->159
161
Antivirus detection
for URL or domain
2->161
163
17 other signatures
2->163
15
file.exe
2
2->15
started
signatures3
process4
file5
119
C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32
15->119
dropped
147
Obfuscated command line
found
15->147
19
file.tmp
18
16
15->19
started
signatures6
process7
file8
89
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
19->89
dropped
91
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
19->91
dropped
93
C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32
19->93
dropped
95
6 other files (5 malicious)
19->95
dropped
22
FRec24.exe
33
19->22
started
process9
dnsIp10
135
45.12.253.56, 49682, 80
CMCSUS
Germany
22->135
137
45.12.253.72, 49683, 80
CMCSUS
Germany
22->137
139
45.12.253.75, 49684, 49687, 49689
CMCSUS
Germany
22->139
101
C:\Users\user\AppData\...\TwD5Cb6U.exe, PE32
22->101
dropped
103
C:\Users\user\AppData\...\yt6297UU.exe, PE32
22->103
dropped
105
C:\Users\user\AppData\Roaming\...\unKNd3R.exe, PE32
22->105
dropped
107
4 other malicious files
22->107
dropped
26
unKNd3R.exe
9
22->26
started
31
KtqgaOYZu.exe
22->31
started
33
TwD5Cb6U.exe
22->33
started
35
3 other processes
22->35
file11
process12
dnsIp13
143
izpr8v2mkew9mygsipxke.5cka9tl3wvorkqapexgbstfzs11lpvew
26->143
117
C:\Users\user\AppData\Local\...\6835875.dll, PE32
26->117
dropped
205
Multi AV Scanner detection
for dropped file
26->205
207
Writes to foreign memory
regions
26->207
209
Allocates memory in
foreign processes
26->209
37
fontview.exe
26->37
started
42
ngentask.exe
4
26->42
started
211
Detected unpacking (changes
PE section rights)
31->211
213
Injects a PE file into
a foreign processes
31->213
44
KtqgaOYZu.exe
78
31->44
started
145
212.113.106.41
ASRELCOMSPBRU
Russian Federation
35->145
46
conhost.exe
35->46
started
48
taskkill.exe
35->48
started
file14
signatures15
process16
dnsIp17
125
109.206.243.168, 49693, 49694, 80
AWMLTNL
Germany
37->125
97
C:\Users\user\AppData\...\nsis_uns68fdaf.dll, PE32+
37->97
dropped
165
Query firmware table
information (likely
to detect VMs)
37->165
167
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
37->167
169
Queries sensitive BIOS
Information (via WMI,
Win32_Bios & Win32_BaseBoard,
often done to detect
virtual machines)
37->169
179
4 other signatures
37->179
50
rundll32.exe
37->50
started
127
45.15.156.202, 15601, 49691
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
42->127
171
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
42->171
173
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
42->173
175
Tries to harvest and
steal browser information
(history, passwords,
etc)
42->175
177
Tries to steal Crypto
Currency Wallets
42->177
129
whiagu52.top
84.21.172.161, 49690, 80
COMBAHTONcombahtonGmbHDE
Germany
44->129
131
www.google.com
142.250.180.132, 443, 49688
GOOGLEUS
United States
44->131
133
2 other IPs or domains
44->133
99
C:\Users\user\AppData\Roaming\...\graved.exe, PE32
44->99
dropped
53
cmd.exe
44->53
started
55
cmd.exe
44->55
started
file18
signatures19
process20
signatures21
149
System process connects
to network (likely due
to code injection or
exploit)
50->149
151
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
50->151
153
Tries to steal Mail
credentials (via file
/ registry access)
50->153
155
4 other signatures
50->155
57
dllhost.exe
50->57
started
62
WerFault.exe
50->62
started
64
graved.exe
53->64
started
66
conhost.exe
53->66
started
68
conhost.exe
55->68
started
70
timeout.exe
55->70
started
process22
dnsIp23
141
transfer.sh
144.76.136.153
HETZNER-ASDE
Germany
57->141
111
C:\Users\user\AppData\Local\...\Library.exe, PE32+
57->111
dropped
113
C:\Users\user\AppData\Local\Temp\Data.exe, PE32+
57->113
dropped
195
System process connects
to network (likely due
to code injection or
exploit)
57->195
72
Library.exe
57->72
started
76
Data.exe
57->76
started
115
C:\Users\user\AppData\...\DpEditor.exe, PE32
64->115
dropped
197
Multi AV Scanner detection
for dropped file
64->197
199
Query firmware table
information (likely
to detect VMs)
64->199
201
Hides threads from debuggers
64->201
203
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
64->203
78
DpEditor.exe
64->78
started
file24
signatures25
process26
file27
109
C:\Users\user\AppData\...\ThreadStorage.exe, PE32+
72->109
dropped
181
Creates an undocumented
autostart registry key
72->181
183
Queries sensitive BIOS
Information (via WMI,
Win32_Bios & Win32_BaseBoard,
often done to detect
virtual machines)
72->183
185
Encrypted powershell
cmdline option found
72->185
193
4 other signatures
72->193
80
powershell.exe
72->80
started
82
MSBuild.exe
72->82
started
85
powershell.exe
76->85
started
187
Query firmware table
information (likely
to detect VMs)
78->187
189
Hides threads from debuggers
78->189
191
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
78->191
signatures28
process29
dnsIp30
87
conhost.exe
80->87
started
123
45.159.189.105
HOSTING-SOLUTIONSUS
Netherlands
82->123
process31
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.