General
-
Target
0c09b34c317c0a1c98dae029678d4ae7c9fac99584e8249bf9464074edced953
-
Size
341KB
-
Sample
211209-dgjzvacbbq
-
MD5
4cfd9d9ed77331de2c7bc4486785584d
-
SHA1
03f2c000753a358207643c6e7d9ef8b86225b8e5
-
SHA256
0c09b34c317c0a1c98dae029678d4ae7c9fac99584e8249bf9464074edced953
-
SHA512
863a11ea2ec6f71e463b324a7020344e3b1a9e55618eddf3bd365fcd163cd8227cdba6381e622656880cf34b2cf0326a9188c3086667467011c7674bcd6f2733
Static task
static1
Behavioral task
behavioral1
Sample
0c09b34c317c0a1c98dae029678d4ae7c9fac99584e8249bf9464074edced953.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Targets
-
-
Target
0c09b34c317c0a1c98dae029678d4ae7c9fac99584e8249bf9464074edced953
-
Size
341KB
-
MD5
4cfd9d9ed77331de2c7bc4486785584d
-
SHA1
03f2c000753a358207643c6e7d9ef8b86225b8e5
-
SHA256
0c09b34c317c0a1c98dae029678d4ae7c9fac99584e8249bf9464074edced953
-
SHA512
863a11ea2ec6f71e463b324a7020344e3b1a9e55618eddf3bd365fcd163cd8227cdba6381e622656880cf34b2cf0326a9188c3086667467011c7674bcd6f2733
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-