General

  • Target

    ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077

  • Size

    3.1MB

  • Sample

    220215-fk92jsbaa4

  • MD5

    fd5c9f9210f7e826267d67d5d9d3565d

  • SHA1

    9f93b2bd2b00c09c39bf0a64ced090b695b13d88

  • SHA256

    ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077

  • SHA512

    97f5efa198e4ad007f9026a1b40025787e6bf421d3f217cee46c9c2b06bdfc00e4d64f35b2069e3041ae0adaf8898d406e8d4f1d83e598883e013896665b31e0

Malware Config

Targets

    • Target

      ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077

    • Size

      3.1MB

    • MD5

      fd5c9f9210f7e826267d67d5d9d3565d

    • SHA1

      9f93b2bd2b00c09c39bf0a64ced090b695b13d88

    • SHA256

      ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077

    • SHA512

      97f5efa198e4ad007f9026a1b40025787e6bf421d3f217cee46c9c2b06bdfc00e4d64f35b2069e3041ae0adaf8898d406e8d4f1d83e598883e013896665b31e0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks