General
-
Target
557e5c189003c36d6bb1995566d58c18c5cebf66cca5c18a34126ba10f952750
-
Size
202KB
-
Sample
210906-tkqjssedgm
-
MD5
87c2b5036459800af1f256dced921a89
-
SHA1
8b464fd4dca7a5e3afe25281534eeb502a1c7968
-
SHA256
557e5c189003c36d6bb1995566d58c18c5cebf66cca5c18a34126ba10f952750
-
SHA512
16509d8b54e5261f8051db482b3d425d90f90071d34e87377d8fdbe943a3b746fd8573f538ade7c52b7e32ccf3bae26c459349a603a6ef0074d2ca1bf44b677d
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://fazanaharahe1.xyz/
http://xandelissane2.xyz/
http://ustiassosale3.xyz/
http://cytheriata4.xyz/
http://ggiergionard5.xyz/
http://rrelleynaniy6.store/
http://danniemusoa7.store/
http://nastanizab8.store/
http://onyokandis9.store/
http://dmunaavank10.store/
http://gilmandros11.site/
http://cusanthana12.site/
http://willietjeana13.site/
http://ximusokall14.site/
http://blodinetisha15.site/
http://urydiahadyss16.club/
http://glasamaddama17.club/
http://marlingarly18.club/
http://alluvianna19.club/
http://xandirkaniel20.club/
Extracted
vidar
40.4
1002
https://romkaxarit.tumblr.com/
-
profile_id
1002
Extracted
vidar
40.4
973
https://romkaxarit.tumblr.com/
-
profile_id
973
Extracted
redline
binance
212.86.102.139:32600
Extracted
redline
Инсталлусы
91.142.77.155:5469
Extracted
redline
2
45.147.228.207:1569
Extracted
redline
test
45.14.49.169:22411
Extracted
redline
NORMAN3
45.14.49.184:28743
Extracted
redline
06.09
95.181.163.157:15089
Extracted
vidar
40.4
937
https://romkaxarit.tumblr.com/
-
profile_id
937
Targets
-
-
Target
557e5c189003c36d6bb1995566d58c18c5cebf66cca5c18a34126ba10f952750
-
Size
202KB
-
MD5
87c2b5036459800af1f256dced921a89
-
SHA1
8b464fd4dca7a5e3afe25281534eeb502a1c7968
-
SHA256
557e5c189003c36d6bb1995566d58c18c5cebf66cca5c18a34126ba10f952750
-
SHA512
16509d8b54e5261f8051db482b3d425d90f90071d34e87377d8fdbe943a3b746fd8573f538ade7c52b7e32ccf3bae26c459349a603a6ef0074d2ca1bf44b677d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-