General
-
Target
dd7a1a0a97405ae9859b41bdba5c52397f8fb240ec2a3664e07453e34d7ac75d
-
Size
241KB
-
Sample
210901-1wnm81y9vs
-
MD5
b2341d60db579377dcd9fb6a7b74b9c2
-
SHA1
5966e5b49aaf0a26183a3eb31e84dced1f41657a
-
SHA256
dd7a1a0a97405ae9859b41bdba5c52397f8fb240ec2a3664e07453e34d7ac75d
-
SHA512
1ab70bbccabf0499451b6eea0a4ef1cbc38ef735b475c85f3d697bb79347aa963fe8ea3d1ac8471edbcc1c37c8be873432ff425e207fdf3c38d65bdec9676313
Static task
static1
Behavioral task
behavioral1
Sample
dd7a1a0a97405ae9859b41bdba5c52397f8fb240ec2a3664e07453e34d7ac75d.exe
Resource
win10-en
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
install
185.167.97.37:30904
Extracted
raccoon
fe582536ec580228180f270f7cb80a867860e010
-
url4cnc
https://telete.in/xylichanjk
Extracted
redline
1
95.181.163.133:54037
Targets
-
-
Target
dd7a1a0a97405ae9859b41bdba5c52397f8fb240ec2a3664e07453e34d7ac75d
-
Size
241KB
-
MD5
b2341d60db579377dcd9fb6a7b74b9c2
-
SHA1
5966e5b49aaf0a26183a3eb31e84dced1f41657a
-
SHA256
dd7a1a0a97405ae9859b41bdba5c52397f8fb240ec2a3664e07453e34d7ac75d
-
SHA512
1ab70bbccabf0499451b6eea0a4ef1cbc38ef735b475c85f3d697bb79347aa963fe8ea3d1ac8471edbcc1c37c8be873432ff425e207fdf3c38d65bdec9676313
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
VKeylogger Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-