General

  • Target

    file.exe

  • Size

    3.1MB

  • Sample

    220917-vejdzaaae7

  • MD5

    4f21f7c5dd185f359655aba1783e14d1

  • SHA1

    fdca3dab73462877d3a6b52a58bdf17aa2ba3b06

  • SHA256

    654eebe75dfe00a3f2573f05804acd17b94987e5a636ac462168041d9d4af750

  • SHA512

    5f16a28b9091362e0e824d2ef7191c3f54c223092f5666f4fad836d0a2a28a635b19af39feebd795dfe7ea99c7e0f9fb2ce96eefb2fde343f89799be5be53342

  • SSDEEP

    98304:9JZetbWyk35t7xgAJvcTvGxMS/eZqNwSIL0UpU:9JZ/hJt7xnkLGgwN

Malware Config

Targets

    • Target

      file.exe

    • Size

      3.1MB

    • MD5

      4f21f7c5dd185f359655aba1783e14d1

    • SHA1

      fdca3dab73462877d3a6b52a58bdf17aa2ba3b06

    • SHA256

      654eebe75dfe00a3f2573f05804acd17b94987e5a636ac462168041d9d4af750

    • SHA512

      5f16a28b9091362e0e824d2ef7191c3f54c223092f5666f4fad836d0a2a28a635b19af39feebd795dfe7ea99c7e0f9fb2ce96eefb2fde343f89799be5be53342

    • SSDEEP

      98304:9JZetbWyk35t7xgAJvcTvGxMS/eZqNwSIL0UpU:9JZ/hJt7xnkLGgwN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks