General

  • Target

    717478234ec5befdb8420e7a1a1157e25c8dba31084c32065ca5b8adb9f236b6

  • Size

    2.6MB

  • Sample

    220215-pkjn2aegb7

  • MD5

    ad5c9790778cb758c87e6da6d8f404c0

  • SHA1

    336a3d6fe8d17ff52a215dccc8f60d0e2cf62ddd

  • SHA256

    717478234ec5befdb8420e7a1a1157e25c8dba31084c32065ca5b8adb9f236b6

  • SHA512

    87e012cdc85d11fe86b65bcfd4401115f94eb3b4823cfc07ca1b3e4121ec0e3004d79cd7ad19965a6a65db84b0e578685b5d19ab84e72dd09d5fe22e406ee44d

Malware Config

Targets

    • Target

      717478234ec5befdb8420e7a1a1157e25c8dba31084c32065ca5b8adb9f236b6

    • Size

      2.6MB

    • MD5

      ad5c9790778cb758c87e6da6d8f404c0

    • SHA1

      336a3d6fe8d17ff52a215dccc8f60d0e2cf62ddd

    • SHA256

      717478234ec5befdb8420e7a1a1157e25c8dba31084c32065ca5b8adb9f236b6

    • SHA512

      87e012cdc85d11fe86b65bcfd4401115f94eb3b4823cfc07ca1b3e4121ec0e3004d79cd7ad19965a6a65db84b0e578685b5d19ab84e72dd09d5fe22e406ee44d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks