General

  • Target

    0ddd9de62aeb8d688648c16293e80963.exe

  • Size

    240KB

  • Sample

    230102-jly78adf69

  • MD5

    0ddd9de62aeb8d688648c16293e80963

  • SHA1

    e0a645d29becf5761ac1479e42a9a49314c89429

  • SHA256

    43a9f0409fde0327f0182a3973c267743c5619ffc985c9952457d972eea7a506

  • SHA512

    0e3fa0f24fb3263cd459d831abca53c9999c2c74e1a06365ee1ca681fd21c0d5ffb694d0fbaa0a0f0b27ab13d419babaf3a2bf284cbf6077a5c5beb960cbfa99

  • SSDEEP

    3072:G8XMmWFkqiILvVdEiMCRX5lWS/EbLYRk103lp2AeFWk2EGRUgM2nvQGW7iSWt:LRqDL96Z+7Z/hA01peqRnV4b7i

Malware Config

Extracted

Family

redline

Botnet

@zallllis

C2

45.15.157.136:7429

Attributes
  • auth_value

    819f274cbc0e7c8d89e811e4a9877964

Targets

    • Target

      0ddd9de62aeb8d688648c16293e80963.exe

    • Size

      240KB

    • MD5

      0ddd9de62aeb8d688648c16293e80963

    • SHA1

      e0a645d29becf5761ac1479e42a9a49314c89429

    • SHA256

      43a9f0409fde0327f0182a3973c267743c5619ffc985c9952457d972eea7a506

    • SHA512

      0e3fa0f24fb3263cd459d831abca53c9999c2c74e1a06365ee1ca681fd21c0d5ffb694d0fbaa0a0f0b27ab13d419babaf3a2bf284cbf6077a5c5beb960cbfa99

    • SSDEEP

      3072:G8XMmWFkqiILvVdEiMCRX5lWS/EbLYRk103lp2AeFWk2EGRUgM2nvQGW7iSWt:LRqDL96Z+7Z/hA01peqRnV4b7i

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks