General
-
Target
d00b0d96d88522cc802359e5dddf7e03692a67060dfa17206e5f4f1ef50b35be
-
Size
1.1MB
-
Sample
231008-z19v9sga9s
-
MD5
473769143d643c8b0d538cf8f788862a
-
SHA1
6b4e57efb63d46e166b8a375c6382c1c88e69a8f
-
SHA256
d00b0d96d88522cc802359e5dddf7e03692a67060dfa17206e5f4f1ef50b35be
-
SHA512
d2418166e2ea911748e463e213e64557e2bfa2dc191fdde4aa95cdd81855fa95aff79476993c0a2444577817b7247a4a7a64ad0f4fac95da73e8e84790590d93
-
SSDEEP
24576:LyukP6qvDDPrU83zefXTCHB+HNNha1eQBf4QQqPnboUpaZ8Y:+ukCIPzUwzefXTCwZa1T14QQQbppaZ8
Static task
static1
Malware Config
Extracted
redline
magia
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
lutyr
77.91.124.55:19071
Targets
-
-
Target
d00b0d96d88522cc802359e5dddf7e03692a67060dfa17206e5f4f1ef50b35be
-
Size
1.1MB
-
MD5
473769143d643c8b0d538cf8f788862a
-
SHA1
6b4e57efb63d46e166b8a375c6382c1c88e69a8f
-
SHA256
d00b0d96d88522cc802359e5dddf7e03692a67060dfa17206e5f4f1ef50b35be
-
SHA512
d2418166e2ea911748e463e213e64557e2bfa2dc191fdde4aa95cdd81855fa95aff79476993c0a2444577817b7247a4a7a64ad0f4fac95da73e8e84790590d93
-
SSDEEP
24576:LyukP6qvDDPrU83zefXTCHB+HNNha1eQBf4QQqPnboUpaZ8Y:+ukCIPzUwzefXTCwZa1T14QQQbppaZ8
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1