General

  • Target

    41d4bcdb9da7c94b1b5e6e88a8518390

  • Size

    344KB

  • Sample

    201117-b4tzq8wlsa

  • MD5

    f863b6b0881ef40a9919d966ea754c87

  • SHA1

    74f2013fc0df5a96d5edfcd77659fabe260c4a1d

  • SHA256

    1b189602123e4dba4522d442877fb0862a8fbbc4cc6d187954ba27039bea7d9c

  • SHA512

    1d3029129a596e9e049590164f04983c7f3cd94a2e94948a30f82279527e4a8b85f714b18b02d709ea42c3f119a1fefc627bd31b5077123b1a03db375224b735

Malware Config

Targets

    • Target

      41d4bcdb9da7c94b1b5e6e88a8518390

    • Size

      344KB

    • MD5

      f863b6b0881ef40a9919d966ea754c87

    • SHA1

      74f2013fc0df5a96d5edfcd77659fabe260c4a1d

    • SHA256

      1b189602123e4dba4522d442877fb0862a8fbbc4cc6d187954ba27039bea7d9c

    • SHA512

      1d3029129a596e9e049590164f04983c7f3cd94a2e94948a30f82279527e4a8b85f714b18b02d709ea42c3f119a1fefc627bd31b5077123b1a03db375224b735

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • themida

      Detects Themida, Advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks