General

  • Target

    adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb

  • Size

    3.1MB

  • Sample

    220215-hynrksdebn

  • MD5

    1e6cff82ce2d682a01fa982c75f3b8f6

  • SHA1

    bb963b7256c5787d1c0787624f6bd2364dbfbf55

  • SHA256

    adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb

  • SHA512

    3708572494729bdbd8662cf447f367893cb4d6844d247c4819c530b6cf3a3407cfeaa5ae790e40081b6c7cc7fc54f1424979192dde44f29dfc525ffed54368a2

Malware Config

Targets

    • Target

      adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb

    • Size

      3.1MB

    • MD5

      1e6cff82ce2d682a01fa982c75f3b8f6

    • SHA1

      bb963b7256c5787d1c0787624f6bd2364dbfbf55

    • SHA256

      adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb

    • SHA512

      3708572494729bdbd8662cf447f367893cb4d6844d247c4819c530b6cf3a3407cfeaa5ae790e40081b6c7cc7fc54f1424979192dde44f29dfc525ffed54368a2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks