General

  • Target

    c23f029198fa3a3870186beedaa56e5d932c091ab3fa28a8e15db30de840f04e

  • Size

    2.4MB

  • Sample

    220215-g6eyzabga6

  • MD5

    46462ba698b2fc730238973d465e6849

  • SHA1

    48e116c02759775b9c16c54da22b81c377943a47

  • SHA256

    c23f029198fa3a3870186beedaa56e5d932c091ab3fa28a8e15db30de840f04e

  • SHA512

    cd184f0848a8de7be4842bb8c4d9fef3012de2d9891623f2560ed1934ce80117c7053fd2b04a93347aaf998235e75c1a2b168559009a9ea37c05908e603b09d9

Malware Config

Targets

    • Target

      c23f029198fa3a3870186beedaa56e5d932c091ab3fa28a8e15db30de840f04e

    • Size

      2.4MB

    • MD5

      46462ba698b2fc730238973d465e6849

    • SHA1

      48e116c02759775b9c16c54da22b81c377943a47

    • SHA256

      c23f029198fa3a3870186beedaa56e5d932c091ab3fa28a8e15db30de840f04e

    • SHA512

      cd184f0848a8de7be4842bb8c4d9fef3012de2d9891623f2560ed1934ce80117c7053fd2b04a93347aaf998235e75c1a2b168559009a9ea37c05908e603b09d9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks