General
-
Target
5155de2312b9523c8f56a6c913b64d3e916323d68030c715e4371909a1b4e2fe
-
Size
261KB
-
Sample
230918-dln5cshc26
-
MD5
7d7d1dcd68f5076ecbb2ab3feb870a4c
-
SHA1
a363963eb016a563f9ee6fec5e410f240513a36c
-
SHA256
5155de2312b9523c8f56a6c913b64d3e916323d68030c715e4371909a1b4e2fe
-
SHA512
24682d2c14e5036e53d4e934a4b4585e8a983bf0953bfa4bba0499b28cc3fb2f4a02d268e57da14dfedb1c666476279b86ce3d7369e7c25af79fab001ba372fa
-
SSDEEP
6144:ZEvJm09zORs+z/TMify9DAO4qQe1zVTv8/:ZMw09CK5NtF1zVD8/
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
0305
185.215.113.25:10195
-
auth_value
c86205ff1cc37b2da12f0190adfda52c
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
5155de2312b9523c8f56a6c913b64d3e916323d68030c715e4371909a1b4e2fe
-
Size
261KB
-
MD5
7d7d1dcd68f5076ecbb2ab3feb870a4c
-
SHA1
a363963eb016a563f9ee6fec5e410f240513a36c
-
SHA256
5155de2312b9523c8f56a6c913b64d3e916323d68030c715e4371909a1b4e2fe
-
SHA512
24682d2c14e5036e53d4e934a4b4585e8a983bf0953bfa4bba0499b28cc3fb2f4a02d268e57da14dfedb1c666476279b86ce3d7369e7c25af79fab001ba372fa
-
SSDEEP
6144:ZEvJm09zORs+z/TMify9DAO4qQe1zVTv8/:ZMw09CK5NtF1zVD8/
-
Detect Fabookie payload
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-