General

  • Target

    d26d44e3fcafbda2412ab16ad267d7e0

  • Size

    1.7MB

  • Sample

    211205-knq53afab6

  • MD5

    d26d44e3fcafbda2412ab16ad267d7e0

  • SHA1

    ab1e7a00000bb5fd37c1c812ba68e9a661912f1b

  • SHA256

    0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504

  • SHA512

    6f98b8eb5b1e708b7a4623cfb54c8243f4d8c941d2c66a838395e7bde8ee082e0458649128ee0b4e7cdb0eb3b03e5868b6b6579dbb370b43aaaa5bd6bda27b80

Malware Config

Targets

    • Target

      d26d44e3fcafbda2412ab16ad267d7e0

    • Size

      1.7MB

    • MD5

      d26d44e3fcafbda2412ab16ad267d7e0

    • SHA1

      ab1e7a00000bb5fd37c1c812ba68e9a661912f1b

    • SHA256

      0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504

    • SHA512

      6f98b8eb5b1e708b7a4623cfb54c8243f4d8c941d2c66a838395e7bde8ee082e0458649128ee0b4e7cdb0eb3b03e5868b6b6579dbb370b43aaaa5bd6bda27b80

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks