General

  • Target

    93c898e900b2f5b2df2eb45ea60f30735444c4bc40166bf6bb487c4846f525bc

  • Size

    2.4MB

  • Sample

    220215-jxwapsceg2

  • MD5

    8fc0c161a03aa927986e6713f7de4854

  • SHA1

    a393954e96b238529bc22f02c987e2c48c785ce3

  • SHA256

    93c898e900b2f5b2df2eb45ea60f30735444c4bc40166bf6bb487c4846f525bc

  • SHA512

    d809d0835532c4d1a86e480ff08f3cde941f7e60b6f8fb813ec240ebbac7261f5aec91b879dc3b3d1b8f246c4ddd2b14661f8caecab56666be83629e285e8fc3

Malware Config

Targets

    • Target

      93c898e900b2f5b2df2eb45ea60f30735444c4bc40166bf6bb487c4846f525bc

    • Size

      2.4MB

    • MD5

      8fc0c161a03aa927986e6713f7de4854

    • SHA1

      a393954e96b238529bc22f02c987e2c48c785ce3

    • SHA256

      93c898e900b2f5b2df2eb45ea60f30735444c4bc40166bf6bb487c4846f525bc

    • SHA512

      d809d0835532c4d1a86e480ff08f3cde941f7e60b6f8fb813ec240ebbac7261f5aec91b879dc3b3d1b8f246c4ddd2b14661f8caecab56666be83629e285e8fc3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks