General

  • Target

    725e7cdd6e81b01e6ab7361fd080af6a.exe

  • Size

    5.4MB

  • Sample

    210313-dgq6amxlg2

  • MD5

    725e7cdd6e81b01e6ab7361fd080af6a

  • SHA1

    3580c0afb395eed72d0bdd86a129563540f3634e

  • SHA256

    a7b172d3fb0092b616e486d62a628e6fa09608d9e9a54773bc34fd37f2227a3e

  • SHA512

    ef080ab04b48f228ee5c003c07cfb05640fa0450e9a8f1ac7a652f80c9f9490153f49795daa044f5a57fac2448fb2c0237f076187114f546db255e7c221ba887

Malware Config

Targets

    • Target

      725e7cdd6e81b01e6ab7361fd080af6a.exe

    • Size

      5.4MB

    • MD5

      725e7cdd6e81b01e6ab7361fd080af6a

    • SHA1

      3580c0afb395eed72d0bdd86a129563540f3634e

    • SHA256

      a7b172d3fb0092b616e486d62a628e6fa09608d9e9a54773bc34fd37f2227a3e

    • SHA512

      ef080ab04b48f228ee5c003c07cfb05640fa0450e9a8f1ac7a652f80c9f9490153f49795daa044f5a57fac2448fb2c0237f076187114f546db255e7c221ba887

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner Payload

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • themida

      Detects Themida, Advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks