General

  • Target

    5779d0b578dc574170d599ee019cba94bc347a0bd315b1be5e32e9d619553992

  • Size

    2.6MB

  • Sample

    220215-qgrqxafbg3

  • MD5

    9fea4fe0f1b98649611e2bb0b82e87b9

  • SHA1

    7d247c5f069e73af4875e941e8b41a75e0672310

  • SHA256

    5779d0b578dc574170d599ee019cba94bc347a0bd315b1be5e32e9d619553992

  • SHA512

    7a0ce2da538a3d5564d5540abfff5009891669e44270fffb112e19386af1d3dfc217d47cafc9c6a4e629d55faf4cdad7257ce0dbb574fa5fc3cfaee7f637e049

Malware Config

Targets

    • Target

      5779d0b578dc574170d599ee019cba94bc347a0bd315b1be5e32e9d619553992

    • Size

      2.6MB

    • MD5

      9fea4fe0f1b98649611e2bb0b82e87b9

    • SHA1

      7d247c5f069e73af4875e941e8b41a75e0672310

    • SHA256

      5779d0b578dc574170d599ee019cba94bc347a0bd315b1be5e32e9d619553992

    • SHA512

      7a0ce2da538a3d5564d5540abfff5009891669e44270fffb112e19386af1d3dfc217d47cafc9c6a4e629d55faf4cdad7257ce0dbb574fa5fc3cfaee7f637e049

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks