General

  • Target

    ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2

  • Size

    2.4MB

  • Sample

    220215-gv683sdack

  • MD5

    8a07d238fff6bf229b75505fbd8fa4b1

  • SHA1

    a6041f6807969f1fa811f6782adb9297b87db39d

  • SHA256

    ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2

  • SHA512

    f1fa7b9a294d02b77825dc0621ca7233fa0b1f8b3a76f7d24136bdb6ade615b2b20bda261c76b3a196faa12066c77b40f8a5814f3fa93eb2beee981f7007ab71

Malware Config

Targets

    • Target

      ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2

    • Size

      2.4MB

    • MD5

      8a07d238fff6bf229b75505fbd8fa4b1

    • SHA1

      a6041f6807969f1fa811f6782adb9297b87db39d

    • SHA256

      ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2

    • SHA512

      f1fa7b9a294d02b77825dc0621ca7233fa0b1f8b3a76f7d24136bdb6ade615b2b20bda261c76b3a196faa12066c77b40f8a5814f3fa93eb2beee981f7007ab71

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks