General
-
Target
0338583080f32e338bb25504417cfaa15c8527cd848091c953424e32f72c49f4
-
Size
335KB
-
Sample
211024-qhbq3seaf8
-
MD5
1c2d9cf0208c5c8c374ccf93236dc800
-
SHA1
5cb496c2522c3d139b77b0225eff2b79d2d1b761
-
SHA256
0338583080f32e338bb25504417cfaa15c8527cd848091c953424e32f72c49f4
-
SHA512
34b800572fb16034a19febe7e870a04b349d10358e2f60d31a9956b591df351b08a12123d7fd28ec70b6a96a712ed44a74e613278c793408d4c2fcc2beaf0787
Static task
static1
Behavioral task
behavioral1
Sample
0338583080f32e338bb25504417cfaa15c8527cd848091c953424e32f72c49f4.exe
Resource
win10-en-20210920
Malware Config
Extracted
smokeloader
2020
http://xacokuo8.top/
http://hajezey1.top/
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
raccoon
a4b1cb9c5c4d693cc9860fbe648999419f9d3d4f
-
url4cnc
http://telegin.top/kaba4ello
http://ttmirror.top/kaba4ello
http://teletele.top/kaba4ello
http://telegalive.top/kaba4ello
http://toptelete.top/kaba4ello
http://telegraf.top/kaba4ello
https://t.me/kaba4ello
Targets
-
-
Target
0338583080f32e338bb25504417cfaa15c8527cd848091c953424e32f72c49f4
-
Size
335KB
-
MD5
1c2d9cf0208c5c8c374ccf93236dc800
-
SHA1
5cb496c2522c3d139b77b0225eff2b79d2d1b761
-
SHA256
0338583080f32e338bb25504417cfaa15c8527cd848091c953424e32f72c49f4
-
SHA512
34b800572fb16034a19febe7e870a04b349d10358e2f60d31a9956b591df351b08a12123d7fd28ec70b6a96a712ed44a74e613278c793408d4c2fcc2beaf0787
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-