General
-
Target
41c82292befc390524d8f93a68a3b691eed87e265392cdd26c6e13622b2db3b3
-
Size
255KB
-
Sample
230919-g7q3mahc98
-
MD5
1585365aa37f05d68f40a473f15fa9f0
-
SHA1
0c03be90b5c9427236f87c284feb571cd7fce238
-
SHA256
41c82292befc390524d8f93a68a3b691eed87e265392cdd26c6e13622b2db3b3
-
SHA512
e3276e86f4c19efc431028033b1d8fb73f9e676f8d868f689a8383cdd4c965b472ae2313f8f3c874abff8b49b903c5eeb7f967101fab12fc44fbf412d8f8b978
-
SSDEEP
6144:mLLBjE42jicP5iOo2T8VrSd/sUAOnilF+RU1Sa:mLtxqiG59ouRizt1Sa
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
0305
185.215.113.25:10195
-
auth_value
c86205ff1cc37b2da12f0190adfda52c
Extracted
smokeloader
up3
Targets
-
-
Target
41c82292befc390524d8f93a68a3b691eed87e265392cdd26c6e13622b2db3b3
-
Size
255KB
-
MD5
1585365aa37f05d68f40a473f15fa9f0
-
SHA1
0c03be90b5c9427236f87c284feb571cd7fce238
-
SHA256
41c82292befc390524d8f93a68a3b691eed87e265392cdd26c6e13622b2db3b3
-
SHA512
e3276e86f4c19efc431028033b1d8fb73f9e676f8d868f689a8383cdd4c965b472ae2313f8f3c874abff8b49b903c5eeb7f967101fab12fc44fbf412d8f8b978
-
SSDEEP
6144:mLLBjE42jicP5iOo2T8VrSd/sUAOnilF+RU1Sa:mLtxqiG59ouRizt1Sa
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-