General
-
Target
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
-
Size
171KB
-
Sample
211215-pcslzaader
-
MD5
595911ab63d7ce2dea26ed3e9aa427df
-
SHA1
841da4a7454d379274e231eefaf9428c298804dc
-
SHA256
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
-
SHA512
b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13
Static task
static1
Behavioral task
behavioral1
Sample
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
icedid
3372020928
jeliskvosh.com
Targets
-
-
Target
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
-
Size
171KB
-
MD5
595911ab63d7ce2dea26ed3e9aa427df
-
SHA1
841da4a7454d379274e231eefaf9428c298804dc
-
SHA256
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
-
SHA512
b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-