General

  • Target

    674f65460796966873e35d832d63f58ad5e01d27e8f7c0e732f65bc44374652e

  • Size

    2.9MB

  • Sample

    220215-pwmj3aehd6

  • MD5

    4920f84c7f65310da58d4866bf27c9bd

  • SHA1

    b436458a87aa70eaf0c9b0f1bf0fc4f24b9b7e60

  • SHA256

    674f65460796966873e35d832d63f58ad5e01d27e8f7c0e732f65bc44374652e

  • SHA512

    481a56f6115e76b1c83ea6c97f9671b5bfcdbf0da3e084de26007f92d22cb47b8486d850eb0f81f90f1e8763e87f1b3f161b03e423b9bf95ce27189dd79b0c3e

Malware Config

Targets

    • Target

      674f65460796966873e35d832d63f58ad5e01d27e8f7c0e732f65bc44374652e

    • Size

      2.9MB

    • MD5

      4920f84c7f65310da58d4866bf27c9bd

    • SHA1

      b436458a87aa70eaf0c9b0f1bf0fc4f24b9b7e60

    • SHA256

      674f65460796966873e35d832d63f58ad5e01d27e8f7c0e732f65bc44374652e

    • SHA512

      481a56f6115e76b1c83ea6c97f9671b5bfcdbf0da3e084de26007f92d22cb47b8486d850eb0f81f90f1e8763e87f1b3f161b03e423b9bf95ce27189dd79b0c3e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks