General
-
Target
f71254abbe313f41bb519ea95f3ce79a7b29688d3415b61c82fd1b200f189598
-
Size
209KB
-
Sample
210829-947n2lstms
-
MD5
a2bfca1d72267b9678a88e880084baa5
-
SHA1
171ab25f1e501ee71c4d637059ca8c1b985eef2a
-
SHA256
f71254abbe313f41bb519ea95f3ce79a7b29688d3415b61c82fd1b200f189598
-
SHA512
0a36afbc08ed3197460aab16f17a231cb83639def21f6ea9561a24128d7ae56807f1dbc9b187539090695a02235b32e116d01c8c2e24476741aa301f8ea3bb9d
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
hello
80.66.87.33:36976
Extracted
amadey
2.50
185.215.113.206/k8FppT/index.php
Extracted
redline
afansdo
77.232.38.156:35454
Extracted
amadey
2.31
x-vpn.ug/hfV3vDtt/index.php
Targets
-
-
Target
f71254abbe313f41bb519ea95f3ce79a7b29688d3415b61c82fd1b200f189598
-
Size
209KB
-
MD5
a2bfca1d72267b9678a88e880084baa5
-
SHA1
171ab25f1e501ee71c4d637059ca8c1b985eef2a
-
SHA256
f71254abbe313f41bb519ea95f3ce79a7b29688d3415b61c82fd1b200f189598
-
SHA512
0a36afbc08ed3197460aab16f17a231cb83639def21f6ea9561a24128d7ae56807f1dbc9b187539090695a02235b32e116d01c8c2e24476741aa301f8ea3bb9d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-