General
-
Target
calc.exe
-
Size
44KB
-
Sample
230409-q43rpada9v
-
MD5
2f82623f9523c0d167862cad0eff6806
-
SHA1
5d77804b87735e66d7d1e263c31c4ef010f16153
-
SHA256
9c2c8a8588fe6db09c09337e78437cb056cd557db1bcf5240112cbfb7b600efb
-
SHA512
7fe8285e52355f2e53650dc4176f62299b8185ed7188850e0a566ddef7e77e1e88511bdcf6f478c938acef3d61d8b269e218970134e1ffc5581f8c7be750c330
-
SSDEEP
384:OtF1XO9GxgL7ol+WSvYWCiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiLiiiiiriM:QOOgL7E4r
Static task
static1
Behavioral task
behavioral1
Sample
calc.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
Rocket
116.203.35.84:1417
-
auth_value
206bd0635ccb8950f15fa014dc1e3c9b
Extracted
gurcu
https://api.telegram.org/bot6169554051:AAEZlwZXnAXKuZLdP2sQ_Y6XeagcNpaF4i8/sendMessage?chat_id=5547954789
https://api.telegram.org/bot6125631937:AAHzA1e2kkAXSFSX6lSoyDACqaM80kXHnEw/sendMessage?chat_id=6155788902
Extracted
smokeloader
pub2
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
calc.exe
-
Size
44KB
-
MD5
2f82623f9523c0d167862cad0eff6806
-
SHA1
5d77804b87735e66d7d1e263c31c4ef010f16153
-
SHA256
9c2c8a8588fe6db09c09337e78437cb056cd557db1bcf5240112cbfb7b600efb
-
SHA512
7fe8285e52355f2e53650dc4176f62299b8185ed7188850e0a566ddef7e77e1e88511bdcf6f478c938acef3d61d8b269e218970134e1ffc5581f8c7be750c330
-
SSDEEP
384:OtF1XO9GxgL7ol+WSvYWCiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiLiiiiiriM:QOOgL7E4r
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-