General

  • Target

    8ca2148c028fa80f102a0366bb03f8de2ea6572b00c5bdb1842c3fc090bfe306

  • Size

    6.6MB

  • Sample

    220215-j6epbacfg4

  • MD5

    b452aa6ee918ef55234a9caccdda8a9f

  • SHA1

    77b66ad9d4a85d240a5fbcb6a2d11b22166a91d9

  • SHA256

    8ca2148c028fa80f102a0366bb03f8de2ea6572b00c5bdb1842c3fc090bfe306

  • SHA512

    cca3f888e8679eced767e7bd2021dfa50aa1278af7a54b487fad8d6222c0a3a0e67eac7187557017243a5974b0abd6c2d256a5ef0bc58e23e8d6e89845f56be8

Malware Config

Targets

    • Target

      8ca2148c028fa80f102a0366bb03f8de2ea6572b00c5bdb1842c3fc090bfe306

    • Size

      6.6MB

    • MD5

      b452aa6ee918ef55234a9caccdda8a9f

    • SHA1

      77b66ad9d4a85d240a5fbcb6a2d11b22166a91d9

    • SHA256

      8ca2148c028fa80f102a0366bb03f8de2ea6572b00c5bdb1842c3fc090bfe306

    • SHA512

      cca3f888e8679eced767e7bd2021dfa50aa1278af7a54b487fad8d6222c0a3a0e67eac7187557017243a5974b0abd6c2d256a5ef0bc58e23e8d6e89845f56be8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Tasks