General

  • Target

    7e0bd7043b674f37a6c086fcd8aa5ddb0ec4ba675e4860e30f88abe3cfe4b879

  • Size

    3.1MB

  • Sample

    220831-r2ht6sffdn

  • MD5

    106078bb0964b75800da2013419239d9

  • SHA1

    44f3c39446cebb7349697703cc88bd0c014b6c7e

  • SHA256

    7e0bd7043b674f37a6c086fcd8aa5ddb0ec4ba675e4860e30f88abe3cfe4b879

  • SHA512

    e9172ecbddc2d11291d6da05a65d967984c72317d525451ad13dbd6931b5b1bf580237926a4f6cd40d265f5b559efaa961352e348ce22827b3e52552ca618b7e

  • SSDEEP

    98304:mHjaMebZao0p4kwkC/yRLmsH5NnyjqCgcg:mH2vaoy3wkC/yRLb5Nny

Malware Config

Extracted

Family

redline

Botnet

3108_RUZKI

C2

213.219.247.199:9452

Attributes
  • auth_value

    f71fed1cd094e4e1eb7ad1c53e542bca

Targets

    • Target

      7e0bd7043b674f37a6c086fcd8aa5ddb0ec4ba675e4860e30f88abe3cfe4b879

    • Size

      3.1MB

    • MD5

      106078bb0964b75800da2013419239d9

    • SHA1

      44f3c39446cebb7349697703cc88bd0c014b6c7e

    • SHA256

      7e0bd7043b674f37a6c086fcd8aa5ddb0ec4ba675e4860e30f88abe3cfe4b879

    • SHA512

      e9172ecbddc2d11291d6da05a65d967984c72317d525451ad13dbd6931b5b1bf580237926a4f6cd40d265f5b559efaa961352e348ce22827b3e52552ca618b7e

    • SSDEEP

      98304:mHjaMebZao0p4kwkC/yRLmsH5NnyjqCgcg:mH2vaoy3wkC/yRLb5Nny

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks