General

  • Target

    14bb993965825a1464638f718cfa97503ff6765e8913b9e2282ad0ee43971395

  • Size

    1.6MB

  • Sample

    211202-xs32msbchr

  • MD5

    09f61b2ba8d637f736eb599816f87b0b

  • SHA1

    19709b7299c0202362aa43911a944c60498f22b5

  • SHA256

    14bb993965825a1464638f718cfa97503ff6765e8913b9e2282ad0ee43971395

  • SHA512

    67579fac648707391a3e35594a6d0294c5c85d39fa46c383831bcfd95a7e454dfad18d09c5ee12b7ac87a5eb4b2ed668f8dcd39e40661d0eb6a7209366126c34

Malware Config

Targets

    • Target

      14bb993965825a1464638f718cfa97503ff6765e8913b9e2282ad0ee43971395

    • Size

      1.6MB

    • MD5

      09f61b2ba8d637f736eb599816f87b0b

    • SHA1

      19709b7299c0202362aa43911a944c60498f22b5

    • SHA256

      14bb993965825a1464638f718cfa97503ff6765e8913b9e2282ad0ee43971395

    • SHA512

      67579fac648707391a3e35594a6d0294c5c85d39fa46c383831bcfd95a7e454dfad18d09c5ee12b7ac87a5eb4b2ed668f8dcd39e40661d0eb6a7209366126c34

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks