General
-
Target
18dd930d0e8fad2f473ad61dce2ace4d51c5e1270dc7dd92e7cc18bd1102a5e4
-
Size
182KB
-
Sample
211208-y5sl4saehk
-
MD5
157d6f806da4bf5de3cc77885dec878f
-
SHA1
3bc0c8f1e3f221d81e0b86cd1ff91e201919cbd4
-
SHA256
18dd930d0e8fad2f473ad61dce2ace4d51c5e1270dc7dd92e7cc18bd1102a5e4
-
SHA512
6511ec7aa942d7a5b01529bc0ae5443beb609a1a62daaa19ac42e37decd229cac3b86b53bcfd679c90af4451ff2a53b817b02e8a924e8ad3e5772f6441d07853
Static task
static1
Behavioral task
behavioral1
Sample
18dd930d0e8fad2f473ad61dce2ace4d51c5e1270dc7dd92e7cc18bd1102a5e4.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Targets
-
-
Target
18dd930d0e8fad2f473ad61dce2ace4d51c5e1270dc7dd92e7cc18bd1102a5e4
-
Size
182KB
-
MD5
157d6f806da4bf5de3cc77885dec878f
-
SHA1
3bc0c8f1e3f221d81e0b86cd1ff91e201919cbd4
-
SHA256
18dd930d0e8fad2f473ad61dce2ace4d51c5e1270dc7dd92e7cc18bd1102a5e4
-
SHA512
6511ec7aa942d7a5b01529bc0ae5443beb609a1a62daaa19ac42e37decd229cac3b86b53bcfd679c90af4451ff2a53b817b02e8a924e8ad3e5772f6441d07853
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-