General
-
Target
d4094705a622215ed5c31a09be5984c61bf154fee1551940b66c7e64c32979ec
-
Size
319KB
-
Sample
231011-hpk94agb5w
-
MD5
c0b3f82859d7fc42ee0f6161498f2629
-
SHA1
05682539c52b718a99530d4107cfdbce06ac20be
-
SHA256
21e43800cf7da59aaa9ee10cba23021f881236354728ffa0adf1272a7d305955
-
SHA512
db9a2c08f08c342365d8e3c4b90746b61a654611e5987c3a8a86833ea7479731fcf6ee7b6daa39179ec991bb9a5d4d4df7fba38aea1779ee5305b628e75e1cdf
-
SSDEEP
6144:As+wvCGVmZgTaPdfeidYbwjnGVscgFcRvHQW0YxzCsaD0EtrwGoVrYQQL39CO0gg:MwagsdfLYrVscgFcBHQW0A+D0iUlY3Qj
Static task
static1
Behavioral task
behavioral1
Sample
d4094705a622215ed5c31a09be5984c61bf154fee1551940b66c7e64c32979ec.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d4094705a622215ed5c31a09be5984c61bf154fee1551940b66c7e64c32979ec.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
6012068394_99
https://pastebin.com/raw/8baCJyMF
Extracted
redline
pixelscloud
85.209.176.171:80
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
breha
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
d4094705a622215ed5c31a09be5984c61bf154fee1551940b66c7e64c32979ec
-
Size
883KB
-
MD5
e2c117540c43eea428711e39837ec4a9
-
SHA1
76fb37134c7ed291a79f19f5a3d3e496ca273788
-
SHA256
d4094705a622215ed5c31a09be5984c61bf154fee1551940b66c7e64c32979ec
-
SHA512
69534a9d509c7129b8561ff6723ae299a12ec5977d1440766983ef7f4ecd433d036cb030f58d65d3d994134bdf455fe1630230f728f27b56ad6e7a270bb594bb
-
SSDEEP
12288:k+hAo2KCDW9g145x58OpGH2EJ/qdDyyZpxThSGu4ywZ52XI/9:kXhW9g145x58Opc/yVzS852Xw9
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1