General
-
Target
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5.zip.zip
-
Size
3.9MB
-
Sample
220422-jm3xssgabk
-
MD5
9f2d00813d696d9932623bf4d857741f
-
SHA1
f831e72ba1d94af727720914a8c86411a281b4e7
-
SHA256
8bcedc0e7fe6cfba64cf47e554b3648cf015eb04ef9d50e0308c5a9779087880
-
SHA512
84e67f515c27efd8efd3c3a65f29909ac4cc8c71a41101258263121812a7be9ba7d4cb0fc32388c7adddd743d4d5f07678aa66cc49c8e4828f2aa327f026c956
Static task
static1
Behavioral task
behavioral1
Sample
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5.exe
Resource
win10v2004-20220414-es
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
redline
ANI
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
smokeloader
2020
http://gmpeople.com/upload/
http://mile48.com/upload/
http://lecanardstsornin.com/upload/
http://m3600.com/upload/
http://camasirx.com/upload/
Targets
-
-
Target
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5.exe
-
Size
3.9MB
-
MD5
99854fad01d4d709cb0f609463491ddf
-
SHA1
dad4de38bedd0dd97a7e76f1e78c60f5dc26c35f
-
SHA256
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5
-
SHA512
9f743e0d598be9563621f5547aae94324a21d5cf3ac6bd6055a8c5d01b49c2fcc7c3ae0d2c4f817a90bfe87c3feb359bc4b1f53433ca5678e6bdb895e5e8c3cd
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Socelars Payload
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
OnlyLogger Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-