General

  • Target

    46845f7c914a0084996142ed6da24841684b228cf616566478132f4a2479823f

  • Size

    1.4MB

  • Sample

    220707-kfqvbshadq

  • MD5

    748cb1cd9aba85527b004417ff814c4d

  • SHA1

    bbeddd65368053979cdef86d44ccccf239347819

  • SHA256

    46845f7c914a0084996142ed6da24841684b228cf616566478132f4a2479823f

  • SHA512

    5f71fba7b6caefa447d65c0284268d421b1952ac67319f082da4f935bc438f8ace6a675775d5fc8ae46ce8dbfb1bd1f949aa42f3ea6665d766c04fe6f245d938

Malware Config

Extracted

Family

redline

Botnet

ddddd4

C2

91.206.14.151:16764

Attributes
  • auth_value

    aca035896c58cf1d32837bf9302ebdc1

Targets

    • Target

      46845f7c914a0084996142ed6da24841684b228cf616566478132f4a2479823f

    • Size

      1.4MB

    • MD5

      748cb1cd9aba85527b004417ff814c4d

    • SHA1

      bbeddd65368053979cdef86d44ccccf239347819

    • SHA256

      46845f7c914a0084996142ed6da24841684b228cf616566478132f4a2479823f

    • SHA512

      5f71fba7b6caefa447d65c0284268d421b1952ac67319f082da4f935bc438f8ace6a675775d5fc8ae46ce8dbfb1bd1f949aa42f3ea6665d766c04fe6f245d938

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks