General

  • Target

    1ff585c0ab541e23ff0e1ede99ae2990762dbe6baede7daf506d32b2b312f657

  • Size

    3.1MB

  • Sample

    220215-sf9lfahebq

  • MD5

    af3e7014917b5f3bda7b6e7c9599b360

  • SHA1

    a56f3c0a7964f0cbab794ed064eee7c07a360f77

  • SHA256

    1ff585c0ab541e23ff0e1ede99ae2990762dbe6baede7daf506d32b2b312f657

  • SHA512

    d14e5ad67eec4a41ac08505a9178634717da265b9a91c1784a79a3e5a77c37dc62ddf58d8044812bb964229bf54146699b83bdb2dac2d713bc7e3b47eb64be6b

Malware Config

Targets

    • Target

      1ff585c0ab541e23ff0e1ede99ae2990762dbe6baede7daf506d32b2b312f657

    • Size

      3.1MB

    • MD5

      af3e7014917b5f3bda7b6e7c9599b360

    • SHA1

      a56f3c0a7964f0cbab794ed064eee7c07a360f77

    • SHA256

      1ff585c0ab541e23ff0e1ede99ae2990762dbe6baede7daf506d32b2b312f657

    • SHA512

      d14e5ad67eec4a41ac08505a9178634717da265b9a91c1784a79a3e5a77c37dc62ddf58d8044812bb964229bf54146699b83bdb2dac2d713bc7e3b47eb64be6b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks