General

  • Target

    c2235892d0fbe0fa34e7fca0a2a5c659103a99e058141a76972648fe32442629

  • Size

    3.4MB

  • Sample

    220215-g6kjfsbga8

  • MD5

    ee81e6e27cd5af7bb2b58f8929da166b

  • SHA1

    8a6e4dc5b6096abbe565e417842fce67fae15247

  • SHA256

    c2235892d0fbe0fa34e7fca0a2a5c659103a99e058141a76972648fe32442629

  • SHA512

    572e0c86c9e28a2d1bdd0d3ca89178759f29cfe5b2344af9e67416fb8c7a5c73fe73be69aa38a7b90f1df56c1d4e5927948ad59d2496bbe300b1a72e0e3a6a64

Malware Config

Targets

    • Target

      c2235892d0fbe0fa34e7fca0a2a5c659103a99e058141a76972648fe32442629

    • Size

      3.4MB

    • MD5

      ee81e6e27cd5af7bb2b58f8929da166b

    • SHA1

      8a6e4dc5b6096abbe565e417842fce67fae15247

    • SHA256

      c2235892d0fbe0fa34e7fca0a2a5c659103a99e058141a76972648fe32442629

    • SHA512

      572e0c86c9e28a2d1bdd0d3ca89178759f29cfe5b2344af9e67416fb8c7a5c73fe73be69aa38a7b90f1df56c1d4e5927948ad59d2496bbe300b1a72e0e3a6a64

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks