General

  • Target

    87ce91791c80059342b755c53c2e09d3.exe

  • Size

    337KB

  • Sample

    211025-g4c2lagfbn

  • MD5

    87ce91791c80059342b755c53c2e09d3

  • SHA1

    6600ddbe3cc7b25cc3aae7e48c12e20061bbcc23

  • SHA256

    7f7b289e8bfd8e547f28478238c98b7ad31c7601e6033b5c1c79afc924b40a6c

  • SHA512

    598978692165a6539082ae93cc6a9aabcabb982ffdcc8702cd8934afdbe43ba3091be056184420b70ede158176bd2c82c0f75b11596efe771a51629edf4b5dba

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

rc4.i32
rc4.i32

Targets

    • Target

      87ce91791c80059342b755c53c2e09d3.exe

    • Size

      337KB

    • MD5

      87ce91791c80059342b755c53c2e09d3

    • SHA1

      6600ddbe3cc7b25cc3aae7e48c12e20061bbcc23

    • SHA256

      7f7b289e8bfd8e547f28478238c98b7ad31c7601e6033b5c1c79afc924b40a6c

    • SHA512

      598978692165a6539082ae93cc6a9aabcabb982ffdcc8702cd8934afdbe43ba3091be056184420b70ede158176bd2c82c0f75b11596efe771a51629edf4b5dba

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks