General

  • Target

    b2eb3021cbedb92df73aaf960a14c73f01ffc9b07f39e4052f679414ae983b57

  • Size

    541KB

  • Sample

    220625-czm9jsagbq

  • MD5

    cf606a21fd97cb1fdb844526f9341167

  • SHA1

    6526497f5fb86519bbe71b23f791187679e0b2e5

  • SHA256

    b2eb3021cbedb92df73aaf960a14c73f01ffc9b07f39e4052f679414ae983b57

  • SHA512

    cd71158c321613c15bb7e2c5e15d5b92d3b9e9f003d0c86990497702c234418988917d09ebe595f38b65f9d1b1e81b52d2bd79a1e944699b6d5d0e66eb88ce5c

Malware Config

Targets

    • Target

      b2eb3021cbedb92df73aaf960a14c73f01ffc9b07f39e4052f679414ae983b57

    • Size

      541KB

    • MD5

      cf606a21fd97cb1fdb844526f9341167

    • SHA1

      6526497f5fb86519bbe71b23f791187679e0b2e5

    • SHA256

      b2eb3021cbedb92df73aaf960a14c73f01ffc9b07f39e4052f679414ae983b57

    • SHA512

      cd71158c321613c15bb7e2c5e15d5b92d3b9e9f003d0c86990497702c234418988917d09ebe595f38b65f9d1b1e81b52d2bd79a1e944699b6d5d0e66eb88ce5c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks