General
-
Target
005bcf051418d05c2750b593278c9fc8.exe
-
Size
6KB
-
Sample
230511-3r21vaba37
-
MD5
005bcf051418d05c2750b593278c9fc8
-
SHA1
3425e499c953eefad59edde4f83e1c04687799c7
-
SHA256
9b6573b930e72d319ef4efa0975ff1b59673f96633a03d5e338bc8d7418418f4
-
SHA512
25faa9966fa531c948c00c2454427220ba79d28230fdac1aec0a5793983d07ff2d71dba0b122bcc5bc24abb1fd18586fe2d4215d796eb9b0ba1d55099538f679
-
SSDEEP
96:MEOIQNVjrXcWD7RtwkYv1X5Yp7svNzNt:MFIojrsWHnwkYv1XyIn
Static task
static1
Behavioral task
behavioral1
Sample
005bcf051418d05c2750b593278c9fc8.exe
Resource
win10-20230220-en
Malware Config
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/o.png
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Targets
-
-
Target
005bcf051418d05c2750b593278c9fc8.exe
-
Size
6KB
-
MD5
005bcf051418d05c2750b593278c9fc8
-
SHA1
3425e499c953eefad59edde4f83e1c04687799c7
-
SHA256
9b6573b930e72d319ef4efa0975ff1b59673f96633a03d5e338bc8d7418418f4
-
SHA512
25faa9966fa531c948c00c2454427220ba79d28230fdac1aec0a5793983d07ff2d71dba0b122bcc5bc24abb1fd18586fe2d4215d796eb9b0ba1d55099538f679
-
SSDEEP
96:MEOIQNVjrXcWD7RtwkYv1X5Yp7svNzNt:MFIojrsWHnwkYv1XyIn
-
Gh0st RAT payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-