General

  • Target

    acd31a76630305890772d4b1b57ef990df6bdf1a67193859d47cfa3b43cf312c

  • Size

    3.4MB

  • Sample

    220215-hzmwnsdeck

  • MD5

    5696457aedcbad574a0081e1b4c8b9a5

  • SHA1

    d8d3878dbbd91af8527ef7437ad2774708871700

  • SHA256

    acd31a76630305890772d4b1b57ef990df6bdf1a67193859d47cfa3b43cf312c

  • SHA512

    a6e109d69ba28d12b5ef01ce9f4bf8c39add5de272e1e4db49a8935a93e7f49542a3950d1de5c7ccf8f7c5c61d5fc5b8233fa0ced6dd5258fcfb13608252d694

Malware Config

Targets

    • Target

      acd31a76630305890772d4b1b57ef990df6bdf1a67193859d47cfa3b43cf312c

    • Size

      3.4MB

    • MD5

      5696457aedcbad574a0081e1b4c8b9a5

    • SHA1

      d8d3878dbbd91af8527ef7437ad2774708871700

    • SHA256

      acd31a76630305890772d4b1b57ef990df6bdf1a67193859d47cfa3b43cf312c

    • SHA512

      a6e109d69ba28d12b5ef01ce9f4bf8c39add5de272e1e4db49a8935a93e7f49542a3950d1de5c7ccf8f7c5c61d5fc5b8233fa0ced6dd5258fcfb13608252d694

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks