General
-
Target
91b7a5caae9a9405d834c71486a67f870299343cff90e48e5cb17ceca2364be4
-
Size
255KB
-
Sample
230919-hhnrmshd54
-
MD5
7246a52d78546cb3fddc9554ec146e7b
-
SHA1
1038d9b743064c7e788279f831a3f23a27891c5b
-
SHA256
91b7a5caae9a9405d834c71486a67f870299343cff90e48e5cb17ceca2364be4
-
SHA512
dded279b84a1c1563c344e1bb15aafab9de11500e4a5a743bb9608b1f3ed2a588254de1aff778583d841646a5404115f255c73085a8c5af560aa0c34ac9e3f88
-
SSDEEP
6144:zwfjEA2jicP5iOo2T8VrSd/sUAOeilU21Sa:zwftqiG59ouQi+21Sa
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
0305
185.215.113.25:10195
-
auth_value
c86205ff1cc37b2da12f0190adfda52c
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
91b7a5caae9a9405d834c71486a67f870299343cff90e48e5cb17ceca2364be4
-
Size
255KB
-
MD5
7246a52d78546cb3fddc9554ec146e7b
-
SHA1
1038d9b743064c7e788279f831a3f23a27891c5b
-
SHA256
91b7a5caae9a9405d834c71486a67f870299343cff90e48e5cb17ceca2364be4
-
SHA512
dded279b84a1c1563c344e1bb15aafab9de11500e4a5a743bb9608b1f3ed2a588254de1aff778583d841646a5404115f255c73085a8c5af560aa0c34ac9e3f88
-
SSDEEP
6144:zwfjEA2jicP5iOo2T8VrSd/sUAOeilU21Sa:zwftqiG59ouQi+21Sa
-
Detect Fabookie payload
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-