General

  • Target

    d77e121ca9dfd4b74fd393e1320a003c6e9d6927f17a6d8408233b167008529d

  • Size

    2.8MB

  • Sample

    220215-gdvtqabdc2

  • MD5

    b8a28a1c5c0eb04b8a09296640744ba2

  • SHA1

    08c520ca6c46ac82b802ac5818eb39cfe03c9af8

  • SHA256

    d77e121ca9dfd4b74fd393e1320a003c6e9d6927f17a6d8408233b167008529d

  • SHA512

    4e911cfee4ba78a4b093972a4c58727bf98d4e9f608612b22e084998724af71d54e7959b070ac3115732b4ac9c919402de1804584ebc3708933110b407d48c84

Malware Config

Targets

    • Target

      d77e121ca9dfd4b74fd393e1320a003c6e9d6927f17a6d8408233b167008529d

    • Size

      2.8MB

    • MD5

      b8a28a1c5c0eb04b8a09296640744ba2

    • SHA1

      08c520ca6c46ac82b802ac5818eb39cfe03c9af8

    • SHA256

      d77e121ca9dfd4b74fd393e1320a003c6e9d6927f17a6d8408233b167008529d

    • SHA512

      4e911cfee4ba78a4b093972a4c58727bf98d4e9f608612b22e084998724af71d54e7959b070ac3115732b4ac9c919402de1804584ebc3708933110b407d48c84

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks