General

  • Target

    466ed8bcdb6d7466660f628d32c9326602e9c20e271cabb32dbd265f27f3dad1

  • Size

    2.4MB

  • Sample

    220707-kqlclabfe7

  • MD5

    dfc65d1cd13a921a501ea6e563ec7310

  • SHA1

    ed65326c9181b4d51b9bea9daf0925d5dc6b0bc2

  • SHA256

    466ed8bcdb6d7466660f628d32c9326602e9c20e271cabb32dbd265f27f3dad1

  • SHA512

    58781636aa44410d7368fe3845c639c7dc47d48a672af487f28ca05d07e39cc143c5662dad9b746bfd44392c751dffeef154ca81fb33985a9a034315762521f3

Malware Config

Targets

    • Target

      466ed8bcdb6d7466660f628d32c9326602e9c20e271cabb32dbd265f27f3dad1

    • Size

      2.4MB

    • MD5

      dfc65d1cd13a921a501ea6e563ec7310

    • SHA1

      ed65326c9181b4d51b9bea9daf0925d5dc6b0bc2

    • SHA256

      466ed8bcdb6d7466660f628d32c9326602e9c20e271cabb32dbd265f27f3dad1

    • SHA512

      58781636aa44410d7368fe3845c639c7dc47d48a672af487f28ca05d07e39cc143c5662dad9b746bfd44392c751dffeef154ca81fb33985a9a034315762521f3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks