General
-
Target
tmp
-
Size
1.5MB
-
Sample
230303-qht8eshe85
-
MD5
43c3f3e2e28157583e7eda204b2b103f
-
SHA1
43939dc8d125df242075d47edd696f6276f7ecb7
-
SHA256
280474eb2d29702b7026467d357d2a34d58c08c82a264c174bce9e4bf694c19b
-
SHA512
6721ad923a1b5329addf034c8decd7d1aee3db800ef19064cfd7d077211d938aab6bb654751b6443cd19bb7a8b6896139787e9379522b3be5e8c5b492c75ef63
-
SSDEEP
12288:qP5IhyeomsP5LxH94zj9jljH0bStIswondr1fDzqJVxLsE8LX:1QYrpDzq1uL
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
CHEAT-MENU
amrican-sport-live-stream.cc:4581
-
auth_value
e948baa7e2fc2d71d02a5864e088ed36
Extracted
asyncrat
0.5.7B
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
smokeloader
2022
http://glueberry-og.cc/
http://glueberry-og.co/
http://glueberry-og.to/
Targets
-
-
Target
tmp
-
Size
1.5MB
-
MD5
43c3f3e2e28157583e7eda204b2b103f
-
SHA1
43939dc8d125df242075d47edd696f6276f7ecb7
-
SHA256
280474eb2d29702b7026467d357d2a34d58c08c82a264c174bce9e4bf694c19b
-
SHA512
6721ad923a1b5329addf034c8decd7d1aee3db800ef19064cfd7d077211d938aab6bb654751b6443cd19bb7a8b6896139787e9379522b3be5e8c5b492c75ef63
-
SSDEEP
12288:qP5IhyeomsP5LxH94zj9jljH0bStIswondr1fDzqJVxLsE8LX:1QYrpDzq1uL
-
Detect PureCrypter injector
-
Detects Smokeloader packer
-
Modifies WinLogon for persistence
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-