General
-
Target
813e04a6b01d54a500a214a1174795d59e82413ba0b73964a7886794e27c8366
-
Size
301KB
-
Sample
211209-jegdtsbaa9
-
MD5
417aed2eecabe6ab2d0b0a61fbaeeac1
-
SHA1
11e93de3e14171daadfe1d8f4734546dc7cfd874
-
SHA256
813e04a6b01d54a500a214a1174795d59e82413ba0b73964a7886794e27c8366
-
SHA512
e83af501c18507aeba3b9c5e92e107f0ec4e55818f3ae4f32bb4cb92a865233e37690d0806c9dbb0413fc6374b096cc4a2f5bce13702a0144659951525d83bb9
Static task
static1
Behavioral task
behavioral1
Sample
813e04a6b01d54a500a214a1174795d59e82413ba0b73964a7886794e27c8366.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Targets
-
-
Target
813e04a6b01d54a500a214a1174795d59e82413ba0b73964a7886794e27c8366
-
Size
301KB
-
MD5
417aed2eecabe6ab2d0b0a61fbaeeac1
-
SHA1
11e93de3e14171daadfe1d8f4734546dc7cfd874
-
SHA256
813e04a6b01d54a500a214a1174795d59e82413ba0b73964a7886794e27c8366
-
SHA512
e83af501c18507aeba3b9c5e92e107f0ec4e55818f3ae4f32bb4cb92a865233e37690d0806c9dbb0413fc6374b096cc4a2f5bce13702a0144659951525d83bb9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-