General

  • Target

    C54CA1DF46D817348C9BDF18F857459D7CA05C51F7F30.exe

  • Size

    5.0MB

  • Sample

    211123-2fyzdabdfq

  • MD5

    09d5cb1ce36967235ccae5c7e5d81ddc

  • SHA1

    e0d7d4a7d21328802b4892c037cc02817b5eb01c

  • SHA256

    c54ca1df46d817348c9bdf18f857459d7ca05c51f7f309e4d4de085136e3ed76

  • SHA512

    54bdfd620fed8442d6eb87d32ce936c64fa85b178c916bd2e7219f1beec7b683a4bf1be4469825ac9edfa4d37c51c735bf3a75740b1b7a8fb2b5edeabb552da7

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://directorycart.com/upload/

http://tierzahnarzt.at/upload/

http://streetofcards.com/upload/

http://ycdfzd.com/upload/

http://successcoachceo.com/upload/

http://uhvu.cn/upload/

http://japanarticle.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

she

C2

135.181.129.119:4805

Extracted

Family

redline

Botnet

ANI

C2

194.104.136.5:46013

Targets

    • Target

      C54CA1DF46D817348C9BDF18F857459D7CA05C51F7F30.exe

    • Size

      5.0MB

    • MD5

      09d5cb1ce36967235ccae5c7e5d81ddc

    • SHA1

      e0d7d4a7d21328802b4892c037cc02817b5eb01c

    • SHA256

      c54ca1df46d817348c9bdf18f857459d7ca05c51f7f309e4d4de085136e3ed76

    • SHA512

      54bdfd620fed8442d6eb87d32ce936c64fa85b178c916bd2e7219f1beec7b683a4bf1be4469825ac9edfa4d37c51c735bf3a75740b1b7a8fb2b5edeabb552da7

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • suricata: ET MALWARE ClipBanker Variant Activity (POST)

      suricata: ET MALWARE ClipBanker Variant Activity (POST)

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks