General
-
Target
7545d1ee58e6a9083ffc9e581e88d8c18dd2d906799c5233fa10b5b3d8cb55ba
-
Size
239KB
-
Sample
230923-zz71aacb87
-
MD5
45d1a96fe58e04510a7921b543ae63c5
-
SHA1
29a50a8f0c81df12676837bd6a7bcb2e5ad9ea0e
-
SHA256
7545d1ee58e6a9083ffc9e581e88d8c18dd2d906799c5233fa10b5b3d8cb55ba
-
SHA512
af40b05837ec36bb90c92fe49a911989d6569e3f65b50f3f245662b11b7df3c7de40819ac595e79cdced8ffff0135922e27421db9f4d4840c0405a06c0593a57
-
SSDEEP
6144:3V46fuYXChoQTjlFgLuCY1dRuAOxXfm4ypuw8y0:3iYzXChdTbv1bu/fmYw8y
Static task
static1
Behavioral task
behavioral1
Sample
7545d1ee58e6a9083ffc9e581e88d8c18dd2d906799c5233fa10b5b3d8cb55ba.exe
Resource
win10-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
7545d1ee58e6a9083ffc9e581e88d8c18dd2d906799c5233fa10b5b3d8cb55ba
-
Size
239KB
-
MD5
45d1a96fe58e04510a7921b543ae63c5
-
SHA1
29a50a8f0c81df12676837bd6a7bcb2e5ad9ea0e
-
SHA256
7545d1ee58e6a9083ffc9e581e88d8c18dd2d906799c5233fa10b5b3d8cb55ba
-
SHA512
af40b05837ec36bb90c92fe49a911989d6569e3f65b50f3f245662b11b7df3c7de40819ac595e79cdced8ffff0135922e27421db9f4d4840c0405a06c0593a57
-
SSDEEP
6144:3V46fuYXChoQTjlFgLuCY1dRuAOxXfm4ypuw8y0:3iYzXChdTbv1bu/fmYw8y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
2Scripting
1