Skip to content

Latest commit

 

History

History
99 lines (83 loc) · 8.48 KB

rebhip.md

File metadata and controls

99 lines (83 loc) · 8.48 KB
ID X0015
Aliases None
Platforms Windows
Year 2011
Associated ATT&CK Software None

Redhip

An information stealer.

ATT&CK Techniques

Name Use
Credential Access::Credentials from Password Stores::Windows Credential Manager (T1555.004) Acquire credentials from Windows Credential Manager (This capa rule had 3 matches) [2]
Defense Evasion::File and Directory Permissions Modification (T1222) Set file attributes (This capa rule had 1 match) [2]
Defense Evasion::Virtualization/Sandbox Evasion::System Checks (T1497.001) Reference anti-VM strings targeting VirtualBox (This capa rule had 1 match) [2]
Discovery::Account Discovery (T1087) Get user security identifier (This capa rule had 1 match) [2]
Discovery::System Owner/User Discovery (T1033) Get session user name (This capa rule had 3 matches) [2]
Execution::Shared Modules (T1129) Access PEB ldr_data (This capa rule had 1 match) [2]

Enhanced ATT&CK Techniques

Name Use
Anti-Static Analysis::Software Packing (F0001) Redhip samples are packed with different custom packers. [1]
Collection::Keylogging::Application Hook (F0002.001) Log keystrokes via application hook (This capa rule had 1 match) [2]
Collection::Keylogging::Polling (F0002.002) Log keystrokes via polling (This capa rule had 1 match) [2]
Defense Evasion::Obfuscated Files or Information::Encoding-Standard Algorithm (E1027.m02) Encode data using XOR (This capa rule had 1 match) [2]
Discovery::File and Directory Discovery (E1083) Get file size (This capa rule had 3 matches) [2]
Persistence::Registry Run Keys / Startup Folder (E1547.001) Persist via Run registry key (This capa rule had 4 matches) [2]
Discovery::System Information Discovery (E1082) Check OS version (This capa rule had 1 match) [2]
Execution::Command and Scripting Interpreter (E1059) Accept command line arguments (This capa rule had 1 match) [2]
Defense Evasion::Process Injection::Thread Execution Hijacking (E1055.003) Inject thread (This capa rule had 1 match) [2]

MBC Behaviors

Name Use
Anti-Behavioral Analysis::Sandbox Detection::Product Key/ID Testing (B0007.005) Redhip detects all publicly available automated malware analysis workbenches (ThreatExpert, JoeBox, etc.) by considering OS product keys and special DLLs. [1] check for sandbox and av modules (This capa rule had 2 matches) [2]
Anti-Behavioral Analysis::Virtual Machine Detection (B0009) Redhip detects VMWare, Virtual PC and Virtual Box. It also detects VM environments in general by considering timing lapses. [1]
Anti-Behavioral Analysis::Debugger Detection (B0001) Redhip uses general approaches to detecting user level debuggers (e.g., Process Environment Block 'Being Debugged' field), as well as specific checks for kernel level debuggers like SOFICE. [1]
Anti-Behavioral Analysis::Debugger Evasion (B0002) Redhip uses general approaches to detecting user level debuggers (e.g., Process Environment Block 'Being Debugged' field), as well as specific checks for kernel level debuggers like SOFICE. [1]
Anti-Behavioral Analysis::Debugger Detection::Process Environment Block BeingDebugged (B0001.035) Check for PEB BeingDebugged flag (This capa rule had 6 matches) [2]
Anti-Behavioral Analysis::Debugger Detection::Timing/Delay Check GetTickCount (B0001.032) Check for time delay via GetTickCount (This capa rule had 1 match) [2]
Cryptography::Cryptographic Hash (C0029) Hash data via WinCrypt (This capa rule had 1 match) [2]
Cryptography::Cryptographic Hash::SHA1 (C0029.002) Hash data using SHA1 (This capa rule had 1 match) [2]
Cryptography::Encrypt Data (C0027) Encrypt data using DPAPI (This capa rule had 6 matches) [2]
Data::Encode Data::XOR (C0026.002) Encode data using XOR (This capa rule had 1 match) [2]
Discovery::Code Discovery::Inspect Section Memory Permissions (B0046.002) Inspect section memory permissions (This capa rule had 1 match) [2]
Discovery::Taskbar Discovery (B0043) Find taskbar (This capa rule had 1 match) [2]
Execution::Install Additional Program (B0023) Contain an embedded PE file (This capa rule had 1 match) [2]
File System::Copy File (C0045) Copy file (This capa rule had 2 matches) [2]
File System::Create Directory (C0046) Create directory (This capa rule had 1 match) [2]
File System::Delete File (C0047) Delete file (This capa rule had 2 matches) [2]
File System::Get File Attributes (C0049) Get file attributes (This capa rule had 2 matches) [2]
File System::Read File (C0051) Read file on Windows (This capa rule had 3 matches) [2]
File System::Set File Attributes (C0050) Set file attributes (This capa rule had 1 match) [2]
File System::Write File (C0052) Write file on Windows (This capa rule had 1 match) [2]
Memory::Allocate Memory (C0007) Spawn thread to RWX shellcode (This capa rule had 1 match) [2]
Operating System::Registry::Delete Registry Key (C0036.002) Delete registry key (This capa rule had 2 matches) [2]
Operating System::Registry::Query Registry Value (C0036.006) Query or enumerate registry value (This capa rule had 9 matches) [2]
Operating System::Registry::Set Registry Key (C0036.001) Set registry value (This capa rule had 4 matches) [2]
Process::Create Mutex (C0042) Create mutex (This capa rule had 1 match) [2]
Process::Create Process (C0017) Create process on Windows (This capa rule had 10 matches) [2]
Process::Create Process::Create Suspended Process (C0017.003) Create process suspended (This capa rule had 10 matches) [2]
Process::Set Thread Local Storage Value (C0041) Set thread local storage value (This capa rule had 1 match) [2]

Indicators of Compromise

SHA256 Hashes

  • 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365
  • 65853e6a70b50166b2e2bd1e163d420d1184ff865183c5f68d8e8bb83eff3e6d

References

[1] https://web.archive.org/web/20161025013916/https://www.fireeye.com/blog/threat-research/2011/01/the-dead-giveaways-of-vm-aware-malware.html

[2] capa v4.0, analyzed at MITRE on 10/12/2022