General
-
Target
A75FFC6AB58574119E960EC0B1F72BFD.exe
-
Size
3.0MB
-
Sample
210905-bmvbnaeeg3
-
MD5
a75ffc6ab58574119e960ec0b1f72bfd
-
SHA1
f7addaaf851436721919294927253726b67ce17b
-
SHA256
8303c9a626d7edb090bdd8f0d128fc887b7fa36b0dfc43a7f71dcb5b34b1bbab
-
SHA512
09520fdf40a16790b93b4ef14a0b177bd65956712d874d782c3b902f9a42869d3691aaf6d038468350b0bdc159c6cf376da94af580c4aa6f48250a7e60b99c5d
Static task
static1
Behavioral task
behavioral1
Sample
A75FFC6AB58574119E960EC0B1F72BFD.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
A75FFC6AB58574119E960EC0B1F72BFD.exe
Resource
win10-en
Malware Config
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
http://shellloader.com/welcome
Extracted
vidar
40.3
706
https://lenko349.tumblr.com/
-
profile_id
706
Targets
-
-
Target
A75FFC6AB58574119E960EC0B1F72BFD.exe
-
Size
3.0MB
-
MD5
a75ffc6ab58574119e960ec0b1f72bfd
-
SHA1
f7addaaf851436721919294927253726b67ce17b
-
SHA256
8303c9a626d7edb090bdd8f0d128fc887b7fa36b0dfc43a7f71dcb5b34b1bbab
-
SHA512
09520fdf40a16790b93b4ef14a0b177bd65956712d874d782c3b902f9a42869d3691aaf6d038468350b0bdc159c6cf376da94af580c4aa6f48250a7e60b99c5d
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
VKeylogger Payload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-