General
-
Target
490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4
-
Size
337KB
-
Sample
211024-159xhafcg5
-
MD5
8c4d48766b81eccc3dc62fe27430ef5a
-
SHA1
d4cfbfa0e66a56574133d1dcf20c2f4d47264028
-
SHA256
490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4
-
SHA512
56eac1b98836e7543948dc13edaf11cd2d3898864569e6d77ebd32fe7d3fb0758b44c5ee26339f31a99da476a8bf9527012464d3f73486ced47929dfe1004301
Static task
static1
Behavioral task
behavioral1
Sample
490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4.exe
Resource
win10-en-20210920
Malware Config
Extracted
smokeloader
2020
http://xacokuo8.top/
http://hajezey1.top/
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
raccoon
ba336408351e2076c6ec5c422139f38a44d0691f
-
url4cnc
http://telegin.top/jjbadb0y
http://ttmirror.top/jjbadb0y
http://teletele.top/jjbadb0y
http://telegalive.top/jjbadb0y
http://toptelete.top/jjbadb0y
http://telegraf.top/jjbadb0y
https://t.me/jjbadb0y
Targets
-
-
Target
490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4
-
Size
337KB
-
MD5
8c4d48766b81eccc3dc62fe27430ef5a
-
SHA1
d4cfbfa0e66a56574133d1dcf20c2f4d47264028
-
SHA256
490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4
-
SHA512
56eac1b98836e7543948dc13edaf11cd2d3898864569e6d77ebd32fe7d3fb0758b44c5ee26339f31a99da476a8bf9527012464d3f73486ced47929dfe1004301
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-