General

  • Target

    ac22f1cf0946c8da0459ebf7cf0a9ab372c83a212426e819f85cb04c93439b30

  • Size

    2.9MB

  • Sample

    220215-h1jweadecr

  • MD5

    2b1342a3f2c7714fea6c43b4ab8a0b20

  • SHA1

    03b5bbb8ba10e161cfbb8d5621f400440d819fb5

  • SHA256

    ac22f1cf0946c8da0459ebf7cf0a9ab372c83a212426e819f85cb04c93439b30

  • SHA512

    74ac8ae814cbb55d4e7c8951b3928e347146d600f25463b0722f96d6424d03c7ae3ebe2eb09e17e64df031874ba545e58e352afd80cf93f6e62eda7332ca3198

Malware Config

Targets

    • Target

      ac22f1cf0946c8da0459ebf7cf0a9ab372c83a212426e819f85cb04c93439b30

    • Size

      2.9MB

    • MD5

      2b1342a3f2c7714fea6c43b4ab8a0b20

    • SHA1

      03b5bbb8ba10e161cfbb8d5621f400440d819fb5

    • SHA256

      ac22f1cf0946c8da0459ebf7cf0a9ab372c83a212426e819f85cb04c93439b30

    • SHA512

      74ac8ae814cbb55d4e7c8951b3928e347146d600f25463b0722f96d6424d03c7ae3ebe2eb09e17e64df031874ba545e58e352afd80cf93f6e62eda7332ca3198

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks