General

  • Target

    a324f24386cddedeaa163b98533b3b03962205bdce1a48cd6630e95aba2379ec

  • Size

    3.7MB

  • Sample

    220215-jct7xacce6

  • MD5

    ad813c97f7cd48856a9c2847ad55b90a

  • SHA1

    c16bc7b76e6de3998bacef08f80a6acce3c5cee2

  • SHA256

    a324f24386cddedeaa163b98533b3b03962205bdce1a48cd6630e95aba2379ec

  • SHA512

    4f5cb2049e03ad76910693b96a3465c9ba6e268f0bf1ba7fce7eb374241acfa08ba645829fabe8ef76606289903655480867f314c17c79efc8b242419d46fadb

Malware Config

Targets

    • Target

      a324f24386cddedeaa163b98533b3b03962205bdce1a48cd6630e95aba2379ec

    • Size

      3.7MB

    • MD5

      ad813c97f7cd48856a9c2847ad55b90a

    • SHA1

      c16bc7b76e6de3998bacef08f80a6acce3c5cee2

    • SHA256

      a324f24386cddedeaa163b98533b3b03962205bdce1a48cd6630e95aba2379ec

    • SHA512

      4f5cb2049e03ad76910693b96a3465c9ba6e268f0bf1ba7fce7eb374241acfa08ba645829fabe8ef76606289903655480867f314c17c79efc8b242419d46fadb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks