General

  • Target

    1f69ccc621bab240c30b0e85c0038e54.exe

  • Size

    296KB

  • Sample

    230331-te1sksbc84

  • MD5

    1f69ccc621bab240c30b0e85c0038e54

  • SHA1

    8c51087557f0ce83d787b2e14b239388c9ec074e

  • SHA256

    654bf06299096148fb1456dd29d44ed0c8eab6add7ad3770f332e5d2e922c126

  • SHA512

    0c9c67ee728baa6894cbb74153fb54537194185dc2a250cf7586cb1698d8023daf1582c44ea09bf681c571d2bdfef78f0899a384c1e3fdc9cae9f4aa89066d02

  • SSDEEP

    3072:VdQ1VDfwIPN9Re4kKXVe8MY0TYYQ38qTzkcN1fcDZJcxCZOPH4TXWvQfu:fqrPN9wKXVHLT4yKJcxCUH2

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

frtrack

C2

francestracking.com:80

Attributes
  • auth_value

    f2f94b780071d26409283a3478312faf

Targets

    • Target

      1f69ccc621bab240c30b0e85c0038e54.exe

    • Size

      296KB

    • MD5

      1f69ccc621bab240c30b0e85c0038e54

    • SHA1

      8c51087557f0ce83d787b2e14b239388c9ec074e

    • SHA256

      654bf06299096148fb1456dd29d44ed0c8eab6add7ad3770f332e5d2e922c126

    • SHA512

      0c9c67ee728baa6894cbb74153fb54537194185dc2a250cf7586cb1698d8023daf1582c44ea09bf681c571d2bdfef78f0899a384c1e3fdc9cae9f4aa89066d02

    • SSDEEP

      3072:VdQ1VDfwIPN9Re4kKXVe8MY0TYYQ38qTzkcN1fcDZJcxCZOPH4TXWvQfu:fqrPN9wKXVHLT4yKJcxCUH2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks