General
-
Target
24c64b6ac83952dbcc423586270744c889038b0198d046fd44f264ec92e012e9
-
Size
261KB
-
Sample
211025-efq77sgebk
-
MD5
f50f239252393e5164bd482a6e5bad8e
-
SHA1
89fb9463fb1330d242cc15b6d3f1e516a5dcf2a6
-
SHA256
24c64b6ac83952dbcc423586270744c889038b0198d046fd44f264ec92e012e9
-
SHA512
5872b441a2a8c2f096b912c7b1e2d55048b7f4b70ed0fa860d44274802becdb2d70bb04b55c5de5e4cc5e1e2477241b7c0195836eba41d97053c7490b518e944
Static task
static1
Behavioral task
behavioral1
Sample
24c64b6ac83952dbcc423586270744c889038b0198d046fd44f264ec92e012e9.exe
Resource
win10-en-20210920
Malware Config
Extracted
smokeloader
2020
http://xacokuo8.top/
http://hajezey1.top/
Targets
-
-
Target
24c64b6ac83952dbcc423586270744c889038b0198d046fd44f264ec92e012e9
-
Size
261KB
-
MD5
f50f239252393e5164bd482a6e5bad8e
-
SHA1
89fb9463fb1330d242cc15b6d3f1e516a5dcf2a6
-
SHA256
24c64b6ac83952dbcc423586270744c889038b0198d046fd44f264ec92e012e9
-
SHA512
5872b441a2a8c2f096b912c7b1e2d55048b7f4b70ed0fa860d44274802becdb2d70bb04b55c5de5e4cc5e1e2477241b7c0195836eba41d97053c7490b518e944
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-