General
-
Target
da3e054d0a6eeb13330a4220895a30a7b3e39a496e6f3b5d5f8a38752cd46c8f
-
Size
165KB
-
Sample
210828-l5mmth3faa
-
MD5
1a4f8842b9e287fbbf803072523e4d2c
-
SHA1
748aaae076ce9331b38ed9c30e7bfff4e924215c
-
SHA256
da3e054d0a6eeb13330a4220895a30a7b3e39a496e6f3b5d5f8a38752cd46c8f
-
SHA512
b7972c1d25d135e0a7ce22c8dd3babda63fe5416afab4396679ff236db4c6964a513596cf086fe2a6025161f265afe8ab3c8bac3d3dc173d20c298d7ffe3bdbe
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
hello
80.66.87.33:36976
Targets
-
-
Target
da3e054d0a6eeb13330a4220895a30a7b3e39a496e6f3b5d5f8a38752cd46c8f
-
Size
165KB
-
MD5
1a4f8842b9e287fbbf803072523e4d2c
-
SHA1
748aaae076ce9331b38ed9c30e7bfff4e924215c
-
SHA256
da3e054d0a6eeb13330a4220895a30a7b3e39a496e6f3b5d5f8a38752cd46c8f
-
SHA512
b7972c1d25d135e0a7ce22c8dd3babda63fe5416afab4396679ff236db4c6964a513596cf086fe2a6025161f265afe8ab3c8bac3d3dc173d20c298d7ffe3bdbe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-