General

  • Target

    254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9

  • Size

    4.0MB

  • Sample

    220520-1gjqeahagm

  • MD5

    8adcb0f839eafc44fb2089457e6bbe8a

  • SHA1

    5b6ae8c5dd9e6ec6aa38dcdb32bfbbca8d0b53c9

  • SHA256

    254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9

  • SHA512

    18373ded0cf20d95ed1fa1c79c810c4370f1a811eab21a11c0a6e0a78de56fd06dc5c0663f1db44b9e612efda0ca921934ed7eba96b0eb26f1e0ceb652705b6b

Malware Config

Targets

    • Target

      254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9

    • Size

      4.0MB

    • MD5

      8adcb0f839eafc44fb2089457e6bbe8a

    • SHA1

      5b6ae8c5dd9e6ec6aa38dcdb32bfbbca8d0b53c9

    • SHA256

      254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9

    • SHA512

      18373ded0cf20d95ed1fa1c79c810c4370f1a811eab21a11c0a6e0a78de56fd06dc5c0663f1db44b9e612efda0ca921934ed7eba96b0eb26f1e0ceb652705b6b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks