{"id":4684,"date":"2022-06-29T09:46:42","date_gmt":"2022-06-29T09:46:42","guid":{"rendered":"https:\/\/fortgale.com\/news\/?p=4684"},"modified":"2023-09-22T07:58:46","modified_gmt":"2023-09-22T07:58:46","slug":"notepad-redline-malware-analysis-italian-systems","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/uncategorized-it\/notepad-redline-malware-analysis-italian-systems\/","title":{"rendered":"Notepad++: RedLine Malware Analysis \u2013 Part 2"},"content":{"rendered":"\n<p>As described in the <a href=\"https:\/\/fortgale.com\/news\/2022\/06\/20\/notepad-backdoor\/\">previous article,<\/a> a <strong>Malware campaign<\/strong> has been identified that uses <strong>GoogleAds<\/strong> to advertise the download of a fake <strong>Notepad++ installation<\/strong>. By analyzing the code it was possible to identify the presence of the <strong>RedLine Stealer<\/strong>.<\/p>\n\n\n\n<p>By downloading from the fake website, you obtain the <strong>ZIP<\/strong> <em>file<\/em> (npp.8.4.1.Installer.x64.zip):<\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/image-26.png\" alt=\"Evidenza del file di installazione Notepad++\" class=\"wp-image-4716\" style=\"width:600px;height:335px\" width=\"600\" height=\"335\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em><strong>SHA-256: 9F7B0E7B7254DF1F1F723F5F048C7D5A864CBED4BB875732BEFD33ECDA645E54<\/strong><\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-medium-font-size\" id=\"h-1-installation-file\" style=\"background-color:#001b3b\">1- Installation File<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"680\" height=\"309\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/image-28.png\" alt=\"file di installazione\" class=\"wp-image-4718\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-28.png 680w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-28-300x136.png 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><strong>SHA-256: D7CD49477AD1B8C676DC3507372CA774A69AF98280DB45A1C9AD0C5F0A4C309E<\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-medium-font-size\" style=\"background-color:#001b3b\">2- Compromise Launch<\/h2>\n\n\n\n<p>Starting the installation file launches the process of compromising the system alongside the actual installation of the Notepad++ software. The <strong>DRIVER~1.exe<\/strong> file, written using the <strong>.NET framework<\/strong>, is written to disk.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"701\" height=\"451\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/image-20.png\" alt=\"\" class=\"wp-image-4686\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-20.png 701w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-20-300x193.png 300w\" sizes=\"(max-width: 701px) 100vw, 701px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<pre class=\"wp-block-code\"><code>MD5:     215f71b938daacad9625b251c880264a\nSHA-1:   22689156e4318332f2560f1a4909febc19226582\nSHA-256: f2394824fcf883e783347ca22f5c610c65e6168e428d382e89fff96b70ae7dc2<\/code><\/pre>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:45% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/00-entrypoint.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"778\" height=\"709\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/00-entrypoint.png\" alt=\"Entrypoint\" class=\"wp-image-4687 size-full\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/00-entrypoint.png 778w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/00-entrypoint-300x273.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/00-entrypoint-768x700.png 768w\" sizes=\"(max-width: 778px) 100vw, 778px\" loading=\"lazy\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\">The presence of numerous <strong>goto <\/strong>instructions, conveyed by controls and operations on the <strong>num<\/strong> variable and the use of names for variables, functions and classes not related to the semantics of the program gave evidence of the application of code <strong>obfuscation and virtualization procedures.<\/strong><\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-medium-font-size\" id=\"h-3-analisi-dinamica\" style=\"background-color:#001b3b\">3- Analisi Dinamica<\/h2>\n\n\n\n<p class=\"has-text-align-left\">By performing dynamic analysis activities, it was possible to identify the first instruction of the Redline Malware: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>getApplicationManifestBytesSerialize.AccessRuleFactoryMda<\/strong>,<\/code><\/pre>\n\n\n\n<p>which in turn calls the <strong>IsEnumSourceLength<\/strong> method from the same class<\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"753\" height=\"259\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/01-evidenza-dll-1.png\" alt=\"\" class=\"wp-image-4688\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/01-evidenza-dll-1.png 753w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/01-evidenza-dll-1-300x103.png 300w\" sizes=\"(max-width: 753px) 100vw, 753px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Loading the dll contained in the executable<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/02-evidenza-dll-2.png\" alt=\"\" class=\"wp-image-4689\" style=\"width:743px;height:323px\" width=\"743\" height=\"323\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/02-evidenza-dll-2.png 743w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/02-evidenza-dll-2-300x130.png 300w\" sizes=\"(max-width: 743px) 100vw, 743px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Decoding the dll contained in the executable<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>The function performs decoding and loads an array of bytes into memory. These are extracted and saved in a file (<strong>Sbpxsycujbk.dll<\/strong>):<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"434\" height=\"265\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/image-29.png\" alt=\"Sbpxsycujbk.dll 6903D034420A0FA693EFF7E32B8837567C4E7E2E60FD4197C663CCDA3331FD38\" class=\"wp-image-4736\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-29.png 434w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-29-300x183.png 300w\" sizes=\"(max-width: 434px) 100vw, 434px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Sbpxsycujbk.dll<\/em>, <br>SHA-256: 6903D034420A0FA693EFF7E32B8837567C4E7E2E60FD4197C663CCDA3331FD38<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The program continues by constructing the name of a method of the newly imported dll which will subsequently be invoked. The method involved is  <strong>Xxgynyqprkwmjd.Wulxsfeuvyfwxzwxcdyric()<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"549\" height=\"491\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/03-esecuzione-comando-da-dll-1.png\" alt=\"\" class=\"wp-image-4690\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/03-esecuzione-comando-da-dll-1.png 549w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/03-esecuzione-comando-da-dll-1-300x268.png 300w\" sizes=\"(max-width: 549px) 100vw, 549px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Construction of the name of the method to be invoked<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/04-esecuzione-comando-da-dll-2.png\" alt=\"\" class=\"wp-image-4691\" style=\"width:822px;height:133px\" width=\"822\" height=\"133\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/04-esecuzione-comando-da-dll-2.png 822w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/04-esecuzione-comando-da-dll-2-300x49.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/04-esecuzione-comando-da-dll-2-768x124.png 768w\" sizes=\"(max-width: 822px) 100vw, 822px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Construction of the name of the method to be invoked<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>The dll makes use of the <strong>.NET framework<\/strong>, whose features relating to code obfuscation and virtualization are similar to those of the main executable. Specifically, it is Eazfuscator.NET which allows different levels of<strong> obfuscation and virtualization of .NET code.<\/strong><\/p>\n\n\n\n<p>The <strong><em>dll<\/em><\/strong> was imported into a C# program that invokes its method. In this way, the use of the <strong>RedLine Malware configuration<\/strong> extracted from a sequence of bytes and subsequently transformed into a C# object was identified:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-2.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1006\" height=\"780\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-2.png\" alt=\"\" class=\"wp-image-4693\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-2.png 1006w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-2-300x233.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-2-768x595.png 768w\" sizes=\"(max-width: 1006px) 100vw, 1006px\" loading=\"lazy\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Malware Configuration<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-1024x505.png\" alt=\"\" class=\"wp-image-4694\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-1024x505.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-300x148.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll-768x379.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/05.5-configurazione-dll.png 1430w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Using malware configuration<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-medium-font-size\" style=\"background-color:#001b3b\">4- Malware behavior and configuration<\/h2>\n\n\n\n<p>The behavior of Malware (RedLine) can be summarized in a series of steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>10 seconds<\/strong> <strong>wait<\/strong> to slow down execution: a process is launched with the command &#8220;cmd \/c timeout 10&#8221;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"732\" height=\"121\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/image-22.png\" alt=\"\" class=\"wp-image-4696\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-22.png 732w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-22-300x50.png 300w\" sizes=\"(max-width: 732px) 100vw, 732px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Process Execution<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"764\" height=\"173\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/image-23.png\" alt=\"\" class=\"wp-image-4697\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-23.png 764w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/image-23-300x68.png 300w\" sizes=\"(max-width: 764px) 100vw, 764px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Execution Details<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enumeration of process modules:<\/strong> the modules loaded by the process are enumerated and the presence of SbieDll.dll is checked among them<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"944\" height=\"317\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/07-controllo-processi.png\" alt=\"\" class=\"wp-image-4698\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/07-controllo-processi.png 944w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/07-controllo-processi-300x101.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/07-controllo-processi-768x258.png 768w\" sizes=\"(max-width: 944px) 100vw, 944px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Enumeration of modules loaded by the process<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AntiVM<\/strong>: WMI queries are performed to search for the presence of values attributable to virtualized systems<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"442\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/08-discovery-1024x442.png\" alt=\"\" class=\"wp-image-4700\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/08-discovery-1024x442.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/08-discovery-300x130.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/08-discovery-768x332.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/08-discovery.png 1206w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>WMI query for recognizing virtualized systems &#8211; Pt.1<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"322\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/09-antiVM-1024x322.png\" alt=\"\" class=\"wp-image-4699\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/09-antiVM-1024x322.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/09-antiVM-300x94.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/09-antiVM-768x242.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/09-antiVM.png 1293w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>AntiVM based on keyword searches within system information &#8211; Pt.1<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li> Further keyword research for recognizing virtualized systems<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"340\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/10-discovery-1024x340.png\" alt=\"\" class=\"wp-image-4701\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/10-discovery-1024x340.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/10-discovery-300x100.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/10-discovery-768x255.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/10-discovery.png 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>WMI query for recognizing virtualized systems- Pt.2<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"378\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/11-antiVM-1024x378.png\" alt=\"\" class=\"wp-image-4702\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/11-antiVM-1024x378.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/11-antiVM-300x111.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/11-antiVM-768x284.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/11-antiVM.png 1243w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\">AntiVM based on keyword searches within system information<em> &#8211; Pt.1<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Writing to disk and running the actual Notepad++ software installer:<\/strong> The Notepad++ software installer is saved to a temporary folder and then executed<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1022\" height=\"168\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/12-creazione-file.png\" alt=\"\" class=\"wp-image-4703\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/12-creazione-file.png 1022w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/12-creazione-file-300x49.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/12-creazione-file-768x126.png 768w\" sizes=\"(max-width: 1022px) 100vw, 1022px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Construction of the installer path<\/em><\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"989\" height=\"153\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/13-scrittura-esecuzione-installer.png\" alt=\"\" class=\"wp-image-4704\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/13-scrittura-esecuzione-installer.png 989w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/13-scrittura-esecuzione-installer-300x46.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/13-scrittura-esecuzione-installer-768x119.png 768w\" sizes=\"(max-width: 989px) 100vw, 989px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Writing and execution of the installer<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Decoding and injection of a further executable:<\/strong> an array of bytes is decoded and subsequently injected into the software process.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"221\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/15-check-installutil-1024x221.png\" alt=\"\" class=\"wp-image-4705\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/15-check-installutil-1024x221.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/15-check-installutil-300x65.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/15-check-installutil-768x166.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/15-check-installutil.png 1223w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Checking the existence of InstallUtil before injection<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-medium-font-size\" style=\"background-color:#001b3b\">5- RedLine Beacon<\/h2>\n\n\n\n<p>The executable injected into memory, which was extracted and analyzed, turns out to be a RedLine beacon whose configuration is encoded in a data structure and whose attribute content has been encrypted through the use of a secret key (also contained in the configuration).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"617\" height=\"277\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/21-informazioni-codificate.png\" alt=\"\" class=\"wp-image-4706\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/21-informazioni-codificate.png 617w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/21-informazioni-codificate-300x135.png 300w\" sizes=\"(max-width: 617px) 100vw, 617px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Beacon Configuration<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>The values are deciphered by specific methods present in the executable. The decryption method identified appears to be related to a simple cipher based on the <strong>XOR<\/strong> operation<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"541\" height=\"193\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/24-codice-decifratura.png\" alt=\"\" class=\"wp-image-4707\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/24-codice-decifratura.png 541w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/24-codice-decifratura-300x107.png 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Method used for deciphering string<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>The RedLine beacon is made up of some features characteristic of a certain type of program, from code execution to the search for specific system components (processes, RAM, files, etc\u2026). The activities to be carried out (tasks) are requested from the command and control server and executed by the program.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"891\" height=\"784\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2022\/06\/23-beacon-enumeration-funzioni.png\" alt=\"\" class=\"wp-image-4710\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/23-beacon-enumeration-funzioni.png 891w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/23-beacon-enumeration-funzioni-300x264.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/06\/23-beacon-enumeration-funzioni-768x676.png 768w\" sizes=\"(max-width: 891px) 100vw, 891px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Some features of the beacon<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-medium-font-size\" style=\"background-color:#001b3b\">5- External References &#8211; RedLine<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.redline_stealer\">RedLine Stealer (Malware Family) (fraunhofer.de)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cert-agid.gov.it\/news\/scoperto-il-malware-redline-stealer-veicolato-come-lastpass\/\">Scoperto il malware RedLine Stealer veicolato come LastPass \u2013 CERT-AGID<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Analisi del Malware RedLine inserito all&#8217;interno di una falsa installazione del software Notepad++<\/p>\n","protected":false},"author":9,"featured_media":4717,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[954],"tags":[1473,1475,1477,1479,1439,439,1483,1485],"class_list":["post-4684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-it","tag-net-it","tag-backdoor-it","tag-eazfuscator-it","tag-eazfuscator-net-it","tag-malware-it","tag-notepad","tag-obfuscation-it","tag-redline-stealer-it"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/4684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=4684"}],"version-history":[{"count":28,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/4684\/revisions"}],"predecessor-version":[{"id":7209,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/4684\/revisions\/7209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media\/4717"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=4684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=4684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=4684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}