General
-
Target
file.exe
-
Size
225KB
-
Sample
231011-1z3k8shb52
-
MD5
bfc55c93babb2fdbe8e1679f713f1d04
-
SHA1
c18f51842c2dd332096c758f47782be0389f278e
-
SHA256
c26d93b2dc38db64e470819c16d1432046989f1e6fd4cdadfe319536333d7195
-
SHA512
16963a63d50fc91e01c420b4f013963830e38bd588db98f92dd548f235b70c8e02909a50b9984bec34549fd547c517aa255b7ba4d7772e068d31ff7300a1e7ed
-
SSDEEP
6144:nPiYHdpZG06NqGskIbTju+dRr6sMRR7T:nn9pZGb5skYdt6sGRv
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.255.152.132:36011
Extracted
smokeloader
up3
Targets
-
-
Target
file.exe
-
Size
225KB
-
MD5
bfc55c93babb2fdbe8e1679f713f1d04
-
SHA1
c18f51842c2dd332096c758f47782be0389f278e
-
SHA256
c26d93b2dc38db64e470819c16d1432046989f1e6fd4cdadfe319536333d7195
-
SHA512
16963a63d50fc91e01c420b4f013963830e38bd588db98f92dd548f235b70c8e02909a50b9984bec34549fd547c517aa255b7ba4d7772e068d31ff7300a1e7ed
-
SSDEEP
6144:nPiYHdpZG06NqGskIbTju+dRr6sMRR7T:nn9pZGb5skYdt6sGRv
-
Detected Djvu ransomware
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-