General
-
Target
7a89fca1f47fc0362c37c24e22679e8711b46d90a13d14d76f78a55c3afd3220
-
Size
223KB
-
Sample
210906-h1p3esdgfl
-
MD5
6510dcfe8de4a0c93235e1408accd14d
-
SHA1
a9eec258630662fec2b9795e31e52849e87cbcaa
-
SHA256
7a89fca1f47fc0362c37c24e22679e8711b46d90a13d14d76f78a55c3afd3220
-
SHA512
b4193659c9e58fd707cdee1d77641171c8b3bac49f30331f1cb0289140f96f15420bc1cff1129ba5add11d32789173b3962b7331c5b6f66c10acfe69a4953e22
Static task
static1
Behavioral task
behavioral1
Sample
7a89fca1f47fc0362c37c24e22679e8711b46d90a13d14d76f78a55c3afd3220.exe
Resource
win10-en
Malware Config
Extracted
smokeloader
2020
http://fioajfoiarjfoi1.xyz/
http://rdukhnihioh2.xyz/
http://sdfghjklemm3.xyz/
http://eruiopijhgnn4.xyz/
http://igbyugfwbwb5.xyz/
http://shfuhfuwhhc6.xyz/
http://ersyglhjkuij7.xyz/
http://ygyguguuju8.store/
http://resbkjpokfct9.store/
http://sdfygfygu10.store/
http://hbibhibihnj11.store/
http://vfwlkjhbghg12.store/
http://poiuytrcvb13.store/
http://xsedfgtbh14.store/
http://iknhyghggh15.store/
http://wnlonevkiju16.site/
http://gfyufuhhihioh17.site/
http://nsgiuwrevi18.site/
http://oiureveiuv19.site/
http://ovrnevnriuen20.site/
http://apowkfeeifin21.site/
http://mewmofinoine22.site/
http://iefhuiehruiu23.site/
http://vjrnnvinerovn24.club/
http://roimvnnvwniov25.club/
http://fwenmfioewnjo26.club/
http://ewoijioewoif27.club/
http://fwjenfuihew28.club/
http://fwkejnfuiewn29.club/
http://fwkjenfuewnh30.club/
Extracted
vidar
40.4
973
https://romkaxarit.tumblr.com/
-
profile_id
973
Extracted
redline
200
45.14.49.28:56898
Extracted
vidar
40.4
948
https://romkaxarit.tumblr.com/
-
profile_id
948
Extracted
redline
big_tastyyy
87.251.71.44:80
Extracted
vidar
40.4
937
https://romkaxarit.tumblr.com/
-
profile_id
937
Extracted
redline
binance
212.86.102.139:32600
Targets
-
-
Target
7a89fca1f47fc0362c37c24e22679e8711b46d90a13d14d76f78a55c3afd3220
-
Size
223KB
-
MD5
6510dcfe8de4a0c93235e1408accd14d
-
SHA1
a9eec258630662fec2b9795e31e52849e87cbcaa
-
SHA256
7a89fca1f47fc0362c37c24e22679e8711b46d90a13d14d76f78a55c3afd3220
-
SHA512
b4193659c9e58fd707cdee1d77641171c8b3bac49f30331f1cb0289140f96f15420bc1cff1129ba5add11d32789173b3962b7331c5b6f66c10acfe69a4953e22
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-