General

  • Target

    b4d6a4a4f8a3a02395fa55b5a4d7d840

  • Size

    4.3MB

  • Sample

    240305-q1n45aha78

  • MD5

    b4d6a4a4f8a3a02395fa55b5a4d7d840

  • SHA1

    bc377f66c3064e18de1360b28a26da64c843b653

  • SHA256

    6c9332da29df57478e1b793298a1d7999c387fbf41f2bb272f7e1b5323f4fbe3

  • SHA512

    e8fbc50a9974007601501b7e7fb00e2403a27b6e50b2428ffe1c41e66f4c1323cf127f3ff9f4b30d55817596cabd3bea3421246f3fbbe586fd2063fef1dcda1b

  • SSDEEP

    98304:uImv7DvgPSiF2jR49NERe12nwcEWTheFs/T3H:uIePg1kF4URbnwcEW9is/T

Malware Config

Targets

    • Target

      b4d6a4a4f8a3a02395fa55b5a4d7d840

    • Size

      4.3MB

    • MD5

      b4d6a4a4f8a3a02395fa55b5a4d7d840

    • SHA1

      bc377f66c3064e18de1360b28a26da64c843b653

    • SHA256

      6c9332da29df57478e1b793298a1d7999c387fbf41f2bb272f7e1b5323f4fbe3

    • SHA512

      e8fbc50a9974007601501b7e7fb00e2403a27b6e50b2428ffe1c41e66f4c1323cf127f3ff9f4b30d55817596cabd3bea3421246f3fbbe586fd2063fef1dcda1b

    • SSDEEP

      98304:uImv7DvgPSiF2jR49NERe12nwcEWTheFs/T3H:uIePg1kF4URbnwcEW9is/T

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks