General

  • Target

    82e230c41b276ea0bfefb73eb2bec06cec09ee02ec027d2a7881bbc36e577c12

  • Size

    3.3MB

  • Sample

    220215-nytwgsede8

  • MD5

    7564cf5e16b0872b0b3a7e5e69b9a2c1

  • SHA1

    ce5a1d790cbf18cff4752b5621e37afd8b3cb95d

  • SHA256

    82e230c41b276ea0bfefb73eb2bec06cec09ee02ec027d2a7881bbc36e577c12

  • SHA512

    28a8e85fa5fad046513e73da1c35d467b46816bc5c818dca8fd1a1b5cdfd2b6dc430a86471ee6a9d56346610560cbee010402ae45a770eb2ee60c16ad2303ccf

Malware Config

Targets

    • Target

      82e230c41b276ea0bfefb73eb2bec06cec09ee02ec027d2a7881bbc36e577c12

    • Size

      3.3MB

    • MD5

      7564cf5e16b0872b0b3a7e5e69b9a2c1

    • SHA1

      ce5a1d790cbf18cff4752b5621e37afd8b3cb95d

    • SHA256

      82e230c41b276ea0bfefb73eb2bec06cec09ee02ec027d2a7881bbc36e577c12

    • SHA512

      28a8e85fa5fad046513e73da1c35d467b46816bc5c818dca8fd1a1b5cdfd2b6dc430a86471ee6a9d56346610560cbee010402ae45a770eb2ee60c16ad2303ccf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks