General

  • Target

    99eb498c965b06069b9badbbca13b3620fb5081010620bd6ebac6e050f5b9803

  • Size

    3.2MB

  • Sample

    210727-sqdndsfgq6

  • MD5

    d704dfedb791137bebd4146f6204d102

  • SHA1

    cfd83f9f0acad4ecf67f5bceb6589f106142fe4c

  • SHA256

    99eb498c965b06069b9badbbca13b3620fb5081010620bd6ebac6e050f5b9803

  • SHA512

    bec027ae7fe820db24fa3334c10f0278dd565c1a680b72ae353b8d713b7edacda485c128d428436c0bcc1df8768a6befbab9a09212478a52481aceef39e06ac8

Malware Config

Targets

    • Target

      99eb498c965b06069b9badbbca13b3620fb5081010620bd6ebac6e050f5b9803

    • Size

      3.2MB

    • MD5

      d704dfedb791137bebd4146f6204d102

    • SHA1

      cfd83f9f0acad4ecf67f5bceb6589f106142fe4c

    • SHA256

      99eb498c965b06069b9badbbca13b3620fb5081010620bd6ebac6e050f5b9803

    • SHA512

      bec027ae7fe820db24fa3334c10f0278dd565c1a680b72ae353b8d713b7edacda485c128d428436c0bcc1df8768a6befbab9a09212478a52481aceef39e06ac8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks