General

  • Target

    84tor

  • Size

    2.4MB

  • Sample

    220626-fytlqaade5

  • MD5

    f9ce2da9564db8c5f99ef2822669cdb2

  • SHA1

    89904ea89f5114567d7f5bda9a46414e80b9b8d1

  • SHA256

    0200431b94084f2b3509336ae5f27a034c8d93b8281d3a45e010299a051f2e8f

  • SHA512

    9fbb4bf21dc1c0c18a85a1fd346cba6b90e62a37424ddac8877939e1dad97062aee4327262c0632a94c072aef50a5f24803f391f8f47493b65a823083b3b04f7

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

84.38.132.100:29934

Targets

    • Target

      84tor

    • Size

      2.4MB

    • MD5

      f9ce2da9564db8c5f99ef2822669cdb2

    • SHA1

      89904ea89f5114567d7f5bda9a46414e80b9b8d1

    • SHA256

      0200431b94084f2b3509336ae5f27a034c8d93b8281d3a45e010299a051f2e8f

    • SHA512

      9fbb4bf21dc1c0c18a85a1fd346cba6b90e62a37424ddac8877939e1dad97062aee4327262c0632a94c072aef50a5f24803f391f8f47493b65a823083b3b04f7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks