General
-
Target
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f
-
Size
182KB
-
Sample
211209-akj78sbdeq
-
MD5
1168d3b5014173d770bb46743876d712
-
SHA1
fde7c3dbe926007a20f030e67b39d90267c769b2
-
SHA256
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f
-
SHA512
d0b57e33a795ce6d197c153353bc50f5ece25f367d7542c2bc6002a87537e134941f3166aa988ec89c9106f693eec82e2f76291d1a19f8cb4b7bc7bf4c853606
Static task
static1
Behavioral task
behavioral1
Sample
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
systembc
185.209.30.180:4001
Targets
-
-
Target
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f
-
Size
182KB
-
MD5
1168d3b5014173d770bb46743876d712
-
SHA1
fde7c3dbe926007a20f030e67b39d90267c769b2
-
SHA256
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f
-
SHA512
d0b57e33a795ce6d197c153353bc50f5ece25f367d7542c2bc6002a87537e134941f3166aa988ec89c9106f693eec82e2f76291d1a19f8cb4b7bc7bf4c853606
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-