General

  • Target

    eb4e27f966306ddd68c653f4e1c1f461deb64c32b714bccb350f1410af960f5f

  • Size

    2.9MB

  • Sample

    220215-fps9labad4

  • MD5

    27326e3e11c155b26b174ad31a111131

  • SHA1

    ca8d631ca4edad09a0d89914e4f109d64e3ce15a

  • SHA256

    eb4e27f966306ddd68c653f4e1c1f461deb64c32b714bccb350f1410af960f5f

  • SHA512

    7ce7ecfa01c23b83003c0c745224855cfda2f3ce9edcb128a61d6b3c50d1cededb17d9e57ed91c4dc380f74a4cdadde74222172fb10777354e05e23bdcc4422c

Malware Config

Targets

    • Target

      eb4e27f966306ddd68c653f4e1c1f461deb64c32b714bccb350f1410af960f5f

    • Size

      2.9MB

    • MD5

      27326e3e11c155b26b174ad31a111131

    • SHA1

      ca8d631ca4edad09a0d89914e4f109d64e3ce15a

    • SHA256

      eb4e27f966306ddd68c653f4e1c1f461deb64c32b714bccb350f1410af960f5f

    • SHA512

      7ce7ecfa01c23b83003c0c745224855cfda2f3ce9edcb128a61d6b3c50d1cededb17d9e57ed91c4dc380f74a4cdadde74222172fb10777354e05e23bdcc4422c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks