General
-
Target
2988763CE776FB8A9C79A2565384A30744CCCD114CDE7.exe
-
Size
3MB
-
Sample
220111-23d8gshhd9
-
MD5
6a9ecc2b12f245698396dadd31dd7e1f
-
SHA1
498a1e5ec1704d96c82e7b6228ac3ba37b9dbee7
-
SHA256
2988763ce776fb8a9c79a2565384a30744cccd114cde7ee49b71965396f41bc7
-
SHA512
76aa9bf2fee130eb06b71d56ec90bf018168f6fa00f599e8e387aec9c7ff442b27669811febb6a3d933a5cde117ee03cc41086db61cfe50b8e6e80ae1a4e5592
Static task
static1
Behavioral task
behavioral1
Sample
2988763CE776FB8A9C79A2565384A30744CCCD114CDE7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2988763CE776FB8A9C79A2565384A30744CCCD114CDE7.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
redline
fucker2
135.181.129.119:4805
Extracted
redline
media18
91.121.67.60:2151
Targets
-
-
Target
2988763CE776FB8A9C79A2565384A30744CCCD114CDE7.exe
-
Size
3MB
-
MD5
6a9ecc2b12f245698396dadd31dd7e1f
-
SHA1
498a1e5ec1704d96c82e7b6228ac3ba37b9dbee7
-
SHA256
2988763ce776fb8a9c79a2565384a30744cccd114cde7ee49b71965396f41bc7
-
SHA512
76aa9bf2fee130eb06b71d56ec90bf018168f6fa00f599e8e387aec9c7ff442b27669811febb6a3d933a5cde117ee03cc41086db61cfe50b8e6e80ae1a4e5592
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Data from Local System
1Command and Control
Credential Access
Credentials in Files
1Defense Evasion
Web Service
1Discovery
Query Registry
1System Information Discovery
2Peripheral Device Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation