General
-
Target
7ea1f2986a2ace0300bdca8290466b31f895b48311d738e58ef70bb427bb40d7
-
Size
261KB
-
Sample
230918-c3hhgaed7s
-
MD5
f0700807596ea2564f5d74ce6183342c
-
SHA1
5d9fc132ce7beb9b9135fd2510f3905a186721ce
-
SHA256
7ea1f2986a2ace0300bdca8290466b31f895b48311d738e58ef70bb427bb40d7
-
SHA512
1756b2f3f9a32b5c1ba5fbe56ee366e5b3079457925839215c514252ee0b73308ded3e2fa4c24aa07bc899b3d80ea8d03123ac7dd24e12d036bdbe899d493149
-
SSDEEP
6144:pGvJm09zORs+z/TMify9DAOoqQDd8V4u8/:puw09CK5NdgdVu8/
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
0305
185.215.113.25:10195
-
auth_value
c86205ff1cc37b2da12f0190adfda52c
Targets
-
-
Target
7ea1f2986a2ace0300bdca8290466b31f895b48311d738e58ef70bb427bb40d7
-
Size
261KB
-
MD5
f0700807596ea2564f5d74ce6183342c
-
SHA1
5d9fc132ce7beb9b9135fd2510f3905a186721ce
-
SHA256
7ea1f2986a2ace0300bdca8290466b31f895b48311d738e58ef70bb427bb40d7
-
SHA512
1756b2f3f9a32b5c1ba5fbe56ee366e5b3079457925839215c514252ee0b73308ded3e2fa4c24aa07bc899b3d80ea8d03123ac7dd24e12d036bdbe899d493149
-
SSDEEP
6144:pGvJm09zORs+z/TMify9DAOoqQDd8V4u8/:puw09CK5NdgdVu8/
-
Detect Fabookie payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-