General
-
Target
d84e4b0534ed220ccf52b88a274f941fd20cf74bf0b9ee7f5739ec562e9a0d3b
-
Size
240KB
-
Sample
230922-vgpc1ahc9t
-
MD5
1e22f9fbbb941fb2a676ad9728707732
-
SHA1
05176d1f13a6c8d3fdaea7adfc363b1d19ecb8e5
-
SHA256
d84e4b0534ed220ccf52b88a274f941fd20cf74bf0b9ee7f5739ec562e9a0d3b
-
SHA512
48cc4d4b0b4be7f15e8e6d91fb2450e1babbca83c39170a56948605c23815b52f8488c838c0dce11ad089e4678b698acc1c85ed942d515ec9b8b8f50c69e0a0e
-
SSDEEP
6144:Gb5frpxdonyq4zaG2u5AO5eK97a6oquqp:G1rp0/9u5/eFquqp
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
d84e4b0534ed220ccf52b88a274f941fd20cf74bf0b9ee7f5739ec562e9a0d3b
-
Size
240KB
-
MD5
1e22f9fbbb941fb2a676ad9728707732
-
SHA1
05176d1f13a6c8d3fdaea7adfc363b1d19ecb8e5
-
SHA256
d84e4b0534ed220ccf52b88a274f941fd20cf74bf0b9ee7f5739ec562e9a0d3b
-
SHA512
48cc4d4b0b4be7f15e8e6d91fb2450e1babbca83c39170a56948605c23815b52f8488c838c0dce11ad089e4678b698acc1c85ed942d515ec9b8b8f50c69e0a0e
-
SSDEEP
6144:Gb5frpxdonyq4zaG2u5AO5eK97a6oquqp:G1rp0/9u5/eFquqp
-
Detect Fabookie payload
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-