General

  • Target

    0e99128756770a199945d659eee6ba1f42032b1cebcab46a1a6bcff0b5d6207c

  • Size

    2.8MB

  • Sample

    220215-s2xtrsged8

  • MD5

    93cefa6d38cd2928172d257e03bc82bf

  • SHA1

    98765f7e6e6d3ca72e6a35e9c789ce8110a26875

  • SHA256

    0e99128756770a199945d659eee6ba1f42032b1cebcab46a1a6bcff0b5d6207c

  • SHA512

    84fa281b3b92a407d9078a7d943b7572fa77b65ccd559a20276d239185b2ff98437711244c9d187d5170333e4e6f0d048859ae11ac006e5e39a40d5efbfe294e

Malware Config

Targets

    • Target

      0e99128756770a199945d659eee6ba1f42032b1cebcab46a1a6bcff0b5d6207c

    • Size

      2.8MB

    • MD5

      93cefa6d38cd2928172d257e03bc82bf

    • SHA1

      98765f7e6e6d3ca72e6a35e9c789ce8110a26875

    • SHA256

      0e99128756770a199945d659eee6ba1f42032b1cebcab46a1a6bcff0b5d6207c

    • SHA512

      84fa281b3b92a407d9078a7d943b7572fa77b65ccd559a20276d239185b2ff98437711244c9d187d5170333e4e6f0d048859ae11ac006e5e39a40d5efbfe294e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks