General

  • Target

    535469754bdf9703c3eef2d9a9f86c0335659b071f5606e87a5e450fe6aee9a3

  • Size

    3.5MB

  • Sample

    220215-qm2s3afcd5

  • MD5

    bc1b52444399a05c9fc0e6fd67bfb59c

  • SHA1

    137c3ed50b9cf53d67ac0929b08602df03f99eea

  • SHA256

    535469754bdf9703c3eef2d9a9f86c0335659b071f5606e87a5e450fe6aee9a3

  • SHA512

    c8b5bfab495d284f66a2bdf3eb1521ffc05ec27b83e91e56419d134cab19f01c126eb532b2d46c90a480608469d7aca55ac91db678ab76148e63c0e9b3e74669

Malware Config

Targets

    • Target

      535469754bdf9703c3eef2d9a9f86c0335659b071f5606e87a5e450fe6aee9a3

    • Size

      3.5MB

    • MD5

      bc1b52444399a05c9fc0e6fd67bfb59c

    • SHA1

      137c3ed50b9cf53d67ac0929b08602df03f99eea

    • SHA256

      535469754bdf9703c3eef2d9a9f86c0335659b071f5606e87a5e450fe6aee9a3

    • SHA512

      c8b5bfab495d284f66a2bdf3eb1521ffc05ec27b83e91e56419d134cab19f01c126eb532b2d46c90a480608469d7aca55ac91db678ab76148e63c0e9b3e74669

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks