General
-
Target
16c9fd8d675b5498e0ceff5bc4fec24e.exe
-
Size
304KB
-
Sample
230716-qjx1psga2t
-
MD5
16c9fd8d675b5498e0ceff5bc4fec24e
-
SHA1
dc0bf40b9dd65c7d25829c9912591dd5118d3ae3
-
SHA256
ef04fe325737cad04ca603cf3a72a71b86bc51786b696972e243cbd0612538b1
-
SHA512
840c285df940177519d06ef0596aa33b40ff8459c1ef4d06dd57caa7d97e0b908a7ab9d785f042dd6a52b46e793dca771adc1f272254757a9193db0f1677089e
-
SSDEEP
3072:+yLxBCoraSJWXrPesHgcLfOiy3XaBdDqRmm2y1d2Z5CcwlgZDGW:TLxIAaSMXjBXbOi6wJmf1sOcFG
Static task
static1
Behavioral task
behavioral1
Sample
16c9fd8d675b5498e0ceff5bc4fec24e.exe
Resource
win7-20230712-en
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Extracted
redline
cc
94.228.169.160:43800
-
auth_value
ec4d19a9dd758ace38b4f5b4a447b048
Targets
-
-
Target
16c9fd8d675b5498e0ceff5bc4fec24e.exe
-
Size
304KB
-
MD5
16c9fd8d675b5498e0ceff5bc4fec24e
-
SHA1
dc0bf40b9dd65c7d25829c9912591dd5118d3ae3
-
SHA256
ef04fe325737cad04ca603cf3a72a71b86bc51786b696972e243cbd0612538b1
-
SHA512
840c285df940177519d06ef0596aa33b40ff8459c1ef4d06dd57caa7d97e0b908a7ab9d785f042dd6a52b46e793dca771adc1f272254757a9193db0f1677089e
-
SSDEEP
3072:+yLxBCoraSJWXrPesHgcLfOiy3XaBdDqRmm2y1d2Z5CcwlgZDGW:TLxIAaSMXjBXbOi6wJmf1sOcFG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-