General
-
Target
Install.exe
-
Size
1.4MB
-
Sample
210228-kpcnajpp1n
-
MD5
96b06955bbf3c12a4bed9ed834ba97f6
-
SHA1
a74161c1087261d87e5d96f4e4f7669942c0991a
-
SHA256
b5ba092c528ddb741364a57f405d07c68ba614eba0e3d3db2e0e5bacecabd476
-
SHA512
ff3a9347c752b9cd100f9346db1f929f08914c0dc98c9a5f995254e1a660000c721d8efbd27f71c747d7199ea51d5fba1d5cc5b0b94bea79246533d0782224d7
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v20201028
Malware Config
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
Extracted
metasploit
windows/single_exec
Extracted
raccoon
5d27abda281eabc425bfae4c755a0a6f987d743b
-
url4cnc
https://telete.in/h_gagger_1
Targets
-
-
Target
Install.exe
-
Size
1.4MB
-
MD5
96b06955bbf3c12a4bed9ed834ba97f6
-
SHA1
a74161c1087261d87e5d96f4e4f7669942c0991a
-
SHA256
b5ba092c528ddb741364a57f405d07c68ba614eba0e3d3db2e0e5bacecabd476
-
SHA512
ff3a9347c752b9cd100f9346db1f929f08914c0dc98c9a5f995254e1a660000c721d8efbd27f71c747d7199ea51d5fba1d5cc5b0b94bea79246533d0782224d7
-
Glupteba Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-