General
-
Target
779c7913d9fb34ce5f2aeef54aba896432b62a9832b7916b218f95599b71d4dc
-
Size
278KB
-
Sample
211205-l2r5ysfag4
-
MD5
a39a1ae4c0800c2d66fa95fb2766d1e9
-
SHA1
8485b138919ba6a17886c384ba240327d30e3a18
-
SHA256
779c7913d9fb34ce5f2aeef54aba896432b62a9832b7916b218f95599b71d4dc
-
SHA512
2da1f115761b97c408f8815d26272a385d4149546cec6efef0f90ee3bb5121a51286c25b1b8b9bf65f0dc5922b6ab0000812ad5ae43295348cdbe044bb029228
Static task
static1
Behavioral task
behavioral1
Sample
779c7913d9fb34ce5f2aeef54aba896432b62a9832b7916b218f95599b71d4dc.exe
Resource
win10-en-20211014
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
http://planilhasvba.com.br/wp-admin/js/k/index.php
http://rpk32ubon.ac.th/backup/k/index.php
http://4urhappiness.com/app/k/index.php
http://swedenkhabar.com/wp-admin/js/k/index.php
http://cio.lankapanel.net/wp-admin/js/k/index.php
http://fcmsites.com.br/canal/wp-admin/js/k/index.php
http://lacoibipitanga.com.br/maxart/k/index.php
http://lacoibipitanga.com.br/cgi-bin/k/index.php
http://video.nalahotel.com/k/index.php
http://diving-phocea.com/wp-admin/k/index.php
http://phocea-sudan.com/cgi-bin/k/index.php
http://rpk32ubon.ac.th/wp-admin/js/k/index.php
https://www.twinrealty.com/vworker/k/index.php
Extracted
raccoon
1.8.3-hotfix
b620be4c85b4051a92040003edbc322be4eb082d
-
url4cnc
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Extracted
vidar
48.9
706
https://qoto.org/@mniami
https://noc.social/@menaomi
-
profile_id
706
Extracted
redline
newyear2022
179.43.187.40:13040
Extracted
raccoon
1.8.3-hotfix
a1fcef6b211f7efaa652483b438c193569359f50
-
url4cnc
http://94.158.245.137/duglassa1
http://91.219.236.27/duglassa1
http://94.158.245.167/duglassa1
http://185.163.204.216/duglassa1
http://185.225.19.238/duglassa1
http://185.163.204.218/duglassa1
https://t.me/duglassa1
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Targets
-
-
Target
779c7913d9fb34ce5f2aeef54aba896432b62a9832b7916b218f95599b71d4dc
-
Size
278KB
-
MD5
a39a1ae4c0800c2d66fa95fb2766d1e9
-
SHA1
8485b138919ba6a17886c384ba240327d30e3a18
-
SHA256
779c7913d9fb34ce5f2aeef54aba896432b62a9832b7916b218f95599b71d4dc
-
SHA512
2da1f115761b97c408f8815d26272a385d4149546cec6efef0f90ee3bb5121a51286c25b1b8b9bf65f0dc5922b6ab0000812ad5ae43295348cdbe044bb029228
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-