General

  • Target

    f66e317ed473eefa183bd115409da21ae3a4c0a5ba63b71d8b71d78811293d1a

  • Size

    7.3MB

  • Sample

    220902-r7xkhsfehl

  • MD5

    4fade52bc24fbd95f4ce91c088f7badf

  • SHA1

    a0e46aa6a7cb670dd7d7f69b0d467b432e267fed

  • SHA256

    f66e317ed473eefa183bd115409da21ae3a4c0a5ba63b71d8b71d78811293d1a

  • SHA512

    669cb10a04b6a8231d625fdbdb46e9f94c08a559b607336344f1030ab436966beb98b557a6090ec272694211c747b49d4ffe9dd8eb5054126c7396b0e2716ca9

  • SSDEEP

    98304:eVhpkZoduG52loermUrbd5oJ8y78qRS/f5XFTwkqj6evniyHStfyywG2iP:eVXjsG52loMmcGYqRQF86evzSFwG2iP

Malware Config

Extracted

Family

redline

Botnet

3108_RUZKI

C2

213.219.247.199:9452

Attributes
  • auth_value

    f71fed1cd094e4e1eb7ad1c53e542bca

Targets

    • Target

      f66e317ed473eefa183bd115409da21ae3a4c0a5ba63b71d8b71d78811293d1a

    • Size

      7.3MB

    • MD5

      4fade52bc24fbd95f4ce91c088f7badf

    • SHA1

      a0e46aa6a7cb670dd7d7f69b0d467b432e267fed

    • SHA256

      f66e317ed473eefa183bd115409da21ae3a4c0a5ba63b71d8b71d78811293d1a

    • SHA512

      669cb10a04b6a8231d625fdbdb46e9f94c08a559b607336344f1030ab436966beb98b557a6090ec272694211c747b49d4ffe9dd8eb5054126c7396b0e2716ca9

    • SSDEEP

      98304:eVhpkZoduG52loermUrbd5oJ8y78qRS/f5XFTwkqj6evniyHStfyywG2iP:eVXjsG52loMmcGYqRQF86evzSFwG2iP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks