General
-
Target
0f16f9e15b819446489a95cd2c968a3366c9ac793aff3117b2dbe16e66663628.bin
-
Size
215KB
-
Sample
230506-y961asbg97
-
MD5
e3645d38b565b7971909110cb457f6b5
-
SHA1
aa83d763f0aa9189ec5f27ec42d02b25a15aa46b
-
SHA256
0f16f9e15b819446489a95cd2c968a3366c9ac793aff3117b2dbe16e66663628
-
SHA512
8ee2e61a7a5509743474eec59f58d3eb6cb6c51ce74c82ceff6fd4fbbe054225b2a463ce904b636d8a65559bb450aa77ab6ce1477721bd355e06a91fdbe6f9d1
-
SSDEEP
3072:5uo0WIoolgrCRUjwJOsDSADmWyKqHUoWtVM6s5y:sWx0wwEuSkys/tV5
Static task
static1
Behavioral task
behavioral1
Sample
0f16f9e15b819446489a95cd2c968a3366c9ac793aff3117b2dbe16e66663628.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0f16f9e15b819446489a95cd2c968a3366c9ac793aff3117b2dbe16e66663628.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.qore
-
offline_id
dp2XHHJytO0BDSHTEAkoGB97DSSLD0rheNyRBit1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-KOKbb3hd7U Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0703Sdeb
Extracted
smokeloader
pub1
Extracted
amadey
3.70
77.73.134.27/n9kdjc3xSf/index.php
Extracted
smokeloader
sprg
Extracted
vidar
3.7
31c7719b5ee962fbde376b75e771360d
https://steamcommunity.com/profiles/76561199501059503
https://t.me/mastersbots
-
profile_id_v2
31c7719b5ee962fbde376b75e771360d
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0
Targets
-
-
Target
0f16f9e15b819446489a95cd2c968a3366c9ac793aff3117b2dbe16e66663628.bin
-
Size
215KB
-
MD5
e3645d38b565b7971909110cb457f6b5
-
SHA1
aa83d763f0aa9189ec5f27ec42d02b25a15aa46b
-
SHA256
0f16f9e15b819446489a95cd2c968a3366c9ac793aff3117b2dbe16e66663628
-
SHA512
8ee2e61a7a5509743474eec59f58d3eb6cb6c51ce74c82ceff6fd4fbbe054225b2a463ce904b636d8a65559bb450aa77ab6ce1477721bd355e06a91fdbe6f9d1
-
SSDEEP
3072:5uo0WIoolgrCRUjwJOsDSADmWyKqHUoWtVM6s5y:sWx0wwEuSkys/tV5
-
Detected Djvu ransomware
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
Detects any file with a triage score of 10
This file has been assigned a triage score of 10, indicating a high likelihood of malicious behavior.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
1