General
-
Target
226d50ee865fa31dd5780b59955d0cc08de81d9694d855ebf1b8094523cd60ea
-
Size
239KB
-
Sample
230923-2k2aasce26
-
MD5
a5c24e1fbbf0a3307cc4556b91bd3072
-
SHA1
51502750e32a5f919db4ccb2aeda21674ae1a599
-
SHA256
226d50ee865fa31dd5780b59955d0cc08de81d9694d855ebf1b8094523cd60ea
-
SHA512
783d3332c3915d77fb9074be45689857778f9e6250ff3d3d9f070ebde15d2a0a13e5821e9ef150bdac948684f4124d2aeca8f3cd73bcb948485c304d617843de
-
SSDEEP
6144:3H46fuYXChoQTjlFgLuCY1dRuAOBpHFw8y0:3YYzXChdTbv1bu3w8y
Static task
static1
Behavioral task
behavioral1
Sample
226d50ee865fa31dd5780b59955d0cc08de81d9694d855ebf1b8094523cd60ea.exe
Resource
win10-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
226d50ee865fa31dd5780b59955d0cc08de81d9694d855ebf1b8094523cd60ea
-
Size
239KB
-
MD5
a5c24e1fbbf0a3307cc4556b91bd3072
-
SHA1
51502750e32a5f919db4ccb2aeda21674ae1a599
-
SHA256
226d50ee865fa31dd5780b59955d0cc08de81d9694d855ebf1b8094523cd60ea
-
SHA512
783d3332c3915d77fb9074be45689857778f9e6250ff3d3d9f070ebde15d2a0a13e5821e9ef150bdac948684f4124d2aeca8f3cd73bcb948485c304d617843de
-
SSDEEP
6144:3H46fuYXChoQTjlFgLuCY1dRuAOBpHFw8y0:3YYzXChdTbv1bu3w8y
-
Detect Fabookie payload
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (89) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Indicator Removal
3File Deletion
3Modify Registry
2Scripting
1