General
-
Target
5ee310ba8a5457718b5c554943914d39d820abf6af3ce7ca087d3441ee089662
-
Size
341KB
-
Sample
211209-awbegaabd7
-
MD5
a81072e83ab01de6da91b58215ce1a43
-
SHA1
9f0fffe9e612c2f1f0e7686d323975e607174ad2
-
SHA256
5ee310ba8a5457718b5c554943914d39d820abf6af3ce7ca087d3441ee089662
-
SHA512
e7ca22f0864ed2828b41a9fab6e4e3440ebbe6ce49c9abef46288f2513c5e9cebf168b1e53a748ef0b714370c7142b0eb3e2a5f1b9fe8f593a08946a306414a4
Static task
static1
Behavioral task
behavioral1
Sample
5ee310ba8a5457718b5c554943914d39d820abf6af3ce7ca087d3441ee089662.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Targets
-
-
Target
5ee310ba8a5457718b5c554943914d39d820abf6af3ce7ca087d3441ee089662
-
Size
341KB
-
MD5
a81072e83ab01de6da91b58215ce1a43
-
SHA1
9f0fffe9e612c2f1f0e7686d323975e607174ad2
-
SHA256
5ee310ba8a5457718b5c554943914d39d820abf6af3ce7ca087d3441ee089662
-
SHA512
e7ca22f0864ed2828b41a9fab6e4e3440ebbe6ce49c9abef46288f2513c5e9cebf168b1e53a748ef0b714370c7142b0eb3e2a5f1b9fe8f593a08946a306414a4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-