General

  • Target

    4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8

  • Size

    262KB

  • Sample

    211025-ex92msfee5

  • MD5

    fe04a1c950a58c44da9ccc5559408cf6

  • SHA1

    22bbb1045738a60f9fa88d26ac00ed4d348ac989

  • SHA256

    4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8

  • SHA512

    aa17ac62381ca1997c27b64d1569fd12611ca3cc0f5e5c7359ce620f49c54cc12d1a4a3ef77f26968b4f855513065e7170b1cd91eed26cb43787c7d089347fe2

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

rc4.i32
rc4.i32

Targets

    • Target

      4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8

    • Size

      262KB

    • MD5

      fe04a1c950a58c44da9ccc5559408cf6

    • SHA1

      22bbb1045738a60f9fa88d26ac00ed4d348ac989

    • SHA256

      4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8

    • SHA512

      aa17ac62381ca1997c27b64d1569fd12611ca3cc0f5e5c7359ce620f49c54cc12d1a4a3ef77f26968b4f855513065e7170b1cd91eed26cb43787c7d089347fe2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks