General

  • Target

    a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad

  • Size

    4.0MB

  • Sample

    220205-nxys2sbcam

  • MD5

    f8a7cbf299ea2c26131d1bd3b6d5bd06

  • SHA1

    913fb7131947d4afba2c054b66934222e752d39e

  • SHA256

    a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad

  • SHA512

    0fe358304b743bd85674e2c6a3dbfb4da6911b6310a0daadc2e173a5f1b4eb570f88a297db850d3a2c075a6a90266bf1e92e3931daca292fe5862d5b3abe0978

Malware Config

Extracted

Family

redline

Botnet

USA1

C2

178.157.91.2:6677

Targets

    • Target

      a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad

    • Size

      4.0MB

    • MD5

      f8a7cbf299ea2c26131d1bd3b6d5bd06

    • SHA1

      913fb7131947d4afba2c054b66934222e752d39e

    • SHA256

      a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad

    • SHA512

      0fe358304b743bd85674e2c6a3dbfb4da6911b6310a0daadc2e173a5f1b4eb570f88a297db850d3a2c075a6a90266bf1e92e3931daca292fe5862d5b3abe0978

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks