General

  • Target

    78405ac19dbdcadaa27e24185f5ca4f0.exe

  • Size

    336KB

  • Sample

    211025-g1g65sgfbj

  • MD5

    78405ac19dbdcadaa27e24185f5ca4f0

  • SHA1

    92bf990d51a29e3578a05e76ec6a9851497d1f60

  • SHA256

    a499e99f2ec3aef0ed06f1d8c2c5b5752bdf1575cba0b2230ea49f810f2db7d4

  • SHA512

    43d09e6672a647215bc55485d605bdf183f759ee050537eecdc4e9021338c298f3e9c37c0f7196ede22580f212cc466565cceb4ee4efc064bfeb455410e6b31e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

rc4.i32
rc4.i32

Targets

    • Target

      78405ac19dbdcadaa27e24185f5ca4f0.exe

    • Size

      336KB

    • MD5

      78405ac19dbdcadaa27e24185f5ca4f0

    • SHA1

      92bf990d51a29e3578a05e76ec6a9851497d1f60

    • SHA256

      a499e99f2ec3aef0ed06f1d8c2c5b5752bdf1575cba0b2230ea49f810f2db7d4

    • SHA512

      43d09e6672a647215bc55485d605bdf183f759ee050537eecdc4e9021338c298f3e9c37c0f7196ede22580f212cc466565cceb4ee4efc064bfeb455410e6b31e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks