General

  • Target

    f314b54520cee8936c980f7b4f497b1630d7dc04bbe8140d38febc7bda502021

  • Size

    2.8MB

  • Sample

    220215-feenfsahc6

  • MD5

    f2881f6c5f3f6062a8229a57a39ef2ae

  • SHA1

    a88b8af7babf4c3ceab601c957e07700389a8160

  • SHA256

    f314b54520cee8936c980f7b4f497b1630d7dc04bbe8140d38febc7bda502021

  • SHA512

    8ecac6ca52c0aec2dadebf76df3fd655d308ded7fd115ee4e8abd6f806a67f4e92ff592fb7167fd4226516fec2af183884dccfbd82e9652667fa0347ca69ed08

Malware Config

Targets

    • Target

      f314b54520cee8936c980f7b4f497b1630d7dc04bbe8140d38febc7bda502021

    • Size

      2.8MB

    • MD5

      f2881f6c5f3f6062a8229a57a39ef2ae

    • SHA1

      a88b8af7babf4c3ceab601c957e07700389a8160

    • SHA256

      f314b54520cee8936c980f7b4f497b1630d7dc04bbe8140d38febc7bda502021

    • SHA512

      8ecac6ca52c0aec2dadebf76df3fd655d308ded7fd115ee4e8abd6f806a67f4e92ff592fb7167fd4226516fec2af183884dccfbd82e9652667fa0347ca69ed08

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks