General

  • Target

    2113661b4223569ae643e9b310276dbc57fad6e8fe5671662437169cda6c24a5

  • Size

    3.0MB

  • Sample

    220215-set5csgca3

  • MD5

    46da92fdfbfabb222d07c17ac1422900

  • SHA1

    5e7129760756960a178f5e6ff231083b62c22fca

  • SHA256

    2113661b4223569ae643e9b310276dbc57fad6e8fe5671662437169cda6c24a5

  • SHA512

    dbe7a74eaae451656d6a2ee75800d2297ef851dd3a559b36a67850b83cc4a2e3fe09851e7ffaadb8ae17493b2b7101d4cb66c5aa0f768558690b88965d070332

Malware Config

Targets

    • Target

      2113661b4223569ae643e9b310276dbc57fad6e8fe5671662437169cda6c24a5

    • Size

      3.0MB

    • MD5

      46da92fdfbfabb222d07c17ac1422900

    • SHA1

      5e7129760756960a178f5e6ff231083b62c22fca

    • SHA256

      2113661b4223569ae643e9b310276dbc57fad6e8fe5671662437169cda6c24a5

    • SHA512

      dbe7a74eaae451656d6a2ee75800d2297ef851dd3a559b36a67850b83cc4a2e3fe09851e7ffaadb8ae17493b2b7101d4cb66c5aa0f768558690b88965d070332

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks