General

  • Target

    9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e

  • Size

    3.0MB

  • Sample

    220215-jlv6kadgfr

  • MD5

    2e2a0de7a60e907ffda9f16ec49f66c1

  • SHA1

    4d346214a6fd67b35e837b397a4ba51d79dd20e0

  • SHA256

    9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e

  • SHA512

    e1b98838783a3ba1e3dcafac62f4362b0e29e450e9d33983f6f81246299f2e5cef90fa23fd5de98918a6d19f8a9eb08d778c14b88af92009bf318443bca3c012

Malware Config

Targets

    • Target

      9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e

    • Size

      3.0MB

    • MD5

      2e2a0de7a60e907ffda9f16ec49f66c1

    • SHA1

      4d346214a6fd67b35e837b397a4ba51d79dd20e0

    • SHA256

      9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e

    • SHA512

      e1b98838783a3ba1e3dcafac62f4362b0e29e450e9d33983f6f81246299f2e5cef90fa23fd5de98918a6d19f8a9eb08d778c14b88af92009bf318443bca3c012

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks