General

  • Target

    file.exe

  • Size

    6.0MB

  • Sample

    231122-2kyjeaff9s

  • MD5

    862bc8adac85c4c24691580f8e9cc830

  • SHA1

    dcbacac408b4a1f6d0aa684fb15455f8e6ee4e7a

  • SHA256

    652517904b568a2d5de03180d87821d06bfaf6afaca530bdc4521a1f35e3e976

  • SHA512

    27d61492a430d7369f2483809a918a469fea813082bc611694e3eaa267672ad6f0c2bb2694a246a61c6563eebf3da25ad504f0ccca4debb75a2386b0780b1e20

  • SSDEEP

    98304:AtBMENiC03DcQyGb7BVTUw3MspLMsiYkfJSas50Tw1:nEt0g7WnF3MsdqYsJtp6

Malware Config

Extracted

Family

redline

C2

195.20.16.131:30344

Targets

    • Target

      file.exe

    • Size

      6.0MB

    • MD5

      862bc8adac85c4c24691580f8e9cc830

    • SHA1

      dcbacac408b4a1f6d0aa684fb15455f8e6ee4e7a

    • SHA256

      652517904b568a2d5de03180d87821d06bfaf6afaca530bdc4521a1f35e3e976

    • SHA512

      27d61492a430d7369f2483809a918a469fea813082bc611694e3eaa267672ad6f0c2bb2694a246a61c6563eebf3da25ad504f0ccca4debb75a2386b0780b1e20

    • SSDEEP

      98304:AtBMENiC03DcQyGb7BVTUw3MspLMsiYkfJSas50Tw1:nEt0g7WnF3MsdqYsJtp6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks