General

  • Target

    0bc3e0e2a07e716c603abd24dcae84cd34cae9f41460e0635e6126a19c00cca1

  • Size

    2.5MB

  • Sample

    220215-s54fqageg9

  • MD5

    81145449114ce9e63c543beeca4e3cb2

  • SHA1

    9738ae925caa842a9f946202cc46665e6d5cc82f

  • SHA256

    0bc3e0e2a07e716c603abd24dcae84cd34cae9f41460e0635e6126a19c00cca1

  • SHA512

    1451c55d2c768c774ec6147b607fa93ba7d7aa3f2153642ce12ca6f67284c14739dc3f68d885e4fd5d4b3360592dcb3371fb12abe8c468b36a9949a919e11520

Malware Config

Targets

    • Target

      0bc3e0e2a07e716c603abd24dcae84cd34cae9f41460e0635e6126a19c00cca1

    • Size

      2.5MB

    • MD5

      81145449114ce9e63c543beeca4e3cb2

    • SHA1

      9738ae925caa842a9f946202cc46665e6d5cc82f

    • SHA256

      0bc3e0e2a07e716c603abd24dcae84cd34cae9f41460e0635e6126a19c00cca1

    • SHA512

      1451c55d2c768c774ec6147b607fa93ba7d7aa3f2153642ce12ca6f67284c14739dc3f68d885e4fd5d4b3360592dcb3371fb12abe8c468b36a9949a919e11520

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks