General
-
Target
b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f
-
Size
275KB
-
Sample
230326-ns13lsgd36
-
MD5
a3977cfffdf7d761f023b079f9112fa2
-
SHA1
8571c879fbfc226e8317612d1bd2f5e1d5a41f0a
-
SHA256
b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f
-
SHA512
0e358d09fdffb9a8c34fecb4a48f56e220b51b094f0a8fa58d5553097843c33b8d711e2cec6e803d20499f8a76ff32eec3cc22e84fe7660fd6bfde02ce255315
-
SSDEEP
3072:33pUWxKhzuaeyUwCYuk4rbZ6vnrS/CWn2niJKuJbuVqpN/GRpNN4TJY:6Nre7wCkvkCO2iLJaV2N/SNN4T
Static task
static1
Malware Config
Extracted
https://cdn.discordapp.com/attachments/1088825170803834963/1089477660289273897/54353463643.ps1
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
redline
W1
45.138.74.246:23202
-
auth_value
610a2c0ff759947b8e0f08aef5e872ca
Extracted
stealc
http://ergrtgrtgwrgrgrgrgwregergerg.cloud/9046019a53d6623�.php
Targets
-
-
Target
b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f
-
Size
275KB
-
MD5
a3977cfffdf7d761f023b079f9112fa2
-
SHA1
8571c879fbfc226e8317612d1bd2f5e1d5a41f0a
-
SHA256
b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f
-
SHA512
0e358d09fdffb9a8c34fecb4a48f56e220b51b094f0a8fa58d5553097843c33b8d711e2cec6e803d20499f8a76ff32eec3cc22e84fe7660fd6bfde02ce255315
-
SSDEEP
3072:33pUWxKhzuaeyUwCYuk4rbZ6vnrS/CWn2niJKuJbuVqpN/GRpNN4TJY:6Nre7wCkvkCO2iLJaV2N/SNN4T
-
Detects Stealc stealer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-