General

  • Target

    SecuriteInfo.com.Artemis71E9E13CA8E3.24292

  • Size

    661KB

  • Sample

    201225-lk4t87zm76

  • MD5

    71e9e13ca8e3a30fd03afa468373b73e

  • SHA1

    87252bfff5dc25086adbaa59cc30897faf4e95ae

  • SHA256

    b0c5153cf37bc26d5845c41dd969822cfc272186c49f0b447060259787bf024a

  • SHA512

    e4d611a31004de676afd8903ed0be97e2cf3dd534037967bf9ec0a169b921259f8ed53e7f799a2285e3903f22bad05ab46848a66dc64fa229c33f9277eb26e55

Malware Config

Targets

    • Target

      SecuriteInfo.com.Artemis71E9E13CA8E3.24292

    • Size

      661KB

    • MD5

      71e9e13ca8e3a30fd03afa468373b73e

    • SHA1

      87252bfff5dc25086adbaa59cc30897faf4e95ae

    • SHA256

      b0c5153cf37bc26d5845c41dd969822cfc272186c49f0b447060259787bf024a

    • SHA512

      e4d611a31004de676afd8903ed0be97e2cf3dd534037967bf9ec0a169b921259f8ed53e7f799a2285e3903f22bad05ab46848a66dc64fa229c33f9277eb26e55

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks