General
-
Target
61db2f0b21ccd58fb18abe969d3c2cdc7e1ea7bcdb84dce1f4be2fe259cb9416
-
Size
239KB
-
Sample
230923-scf5qagf7v
-
MD5
db313d41976eaea9b41436716f01e3ea
-
SHA1
c583b7a4ee26fdc1226f8bcfd82059eca8e42e7d
-
SHA256
61db2f0b21ccd58fb18abe969d3c2cdc7e1ea7bcdb84dce1f4be2fe259cb9416
-
SHA512
3b8b9aa8860fade585a89e19313dcf12a238f36d24c158c485d1d11376a6d2304536046b547c51fc35a6707bbcda4ca4c730b81588a6bad3ce5ba2fb467a25e3
-
SSDEEP
6144:qo46fuYXChoQTjlFgLuCY1dRuAOsTFuN85YoKew8y0:qZYzXChdTbv1buxew8y
Static task
static1
Behavioral task
behavioral1
Sample
61db2f0b21ccd58fb18abe969d3c2cdc7e1ea7bcdb84dce1f4be2fe259cb9416.exe
Resource
win10-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Targets
-
-
Target
61db2f0b21ccd58fb18abe969d3c2cdc7e1ea7bcdb84dce1f4be2fe259cb9416
-
Size
239KB
-
MD5
db313d41976eaea9b41436716f01e3ea
-
SHA1
c583b7a4ee26fdc1226f8bcfd82059eca8e42e7d
-
SHA256
61db2f0b21ccd58fb18abe969d3c2cdc7e1ea7bcdb84dce1f4be2fe259cb9416
-
SHA512
3b8b9aa8860fade585a89e19313dcf12a238f36d24c158c485d1d11376a6d2304536046b547c51fc35a6707bbcda4ca4c730b81588a6bad3ce5ba2fb467a25e3
-
SSDEEP
6144:qo46fuYXChoQTjlFgLuCY1dRuAOsTFuN85YoKew8y0:qZYzXChdTbv1buxew8y
-
Detect Fabookie payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-