General
-
Target
6e31b422ffcd882a3b8f73a6fb88c1fe750d10e867c74b70a76427ae683e6896
-
Size
333KB
-
Sample
211201-3e9vxsgghp
-
MD5
01dd0a615be98a52850cd041b41861a4
-
SHA1
a72556685eb86063537651caf15c3c48487d87f5
-
SHA256
6e31b422ffcd882a3b8f73a6fb88c1fe750d10e867c74b70a76427ae683e6896
-
SHA512
17d14ca81d0dc91c975ade02291d5596e5d5df4ae66b9fd12e422577c2234227d9a860931bfbf46584a180deb52dc59bb28f0a3cfed4bf7300e61a622a6fe144
Static task
static1
Behavioral task
behavioral1
Sample
6e31b422ffcd882a3b8f73a6fb88c1fe750d10e867c74b70a76427ae683e6896.exe
Resource
win10-en-20211104
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
https://cinems.club/search.php
https://clothes.surf/search.php
Extracted
redline
1
45.9.20.59:46287
Targets
-
-
Target
6e31b422ffcd882a3b8f73a6fb88c1fe750d10e867c74b70a76427ae683e6896
-
Size
333KB
-
MD5
01dd0a615be98a52850cd041b41861a4
-
SHA1
a72556685eb86063537651caf15c3c48487d87f5
-
SHA256
6e31b422ffcd882a3b8f73a6fb88c1fe750d10e867c74b70a76427ae683e6896
-
SHA512
17d14ca81d0dc91c975ade02291d5596e5d5df4ae66b9fd12e422577c2234227d9a860931bfbf46584a180deb52dc59bb28f0a3cfed4bf7300e61a622a6fe144
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Deletes itself
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-