General
-
Target
2f6fac8ccbebb2c958e9f53fe63c14f7d22498560f52e5e5839ef67db24c81ef
-
Size
240KB
-
Sample
231012-d137tscf7v
-
MD5
a66af10ad457a7491d0ccce208240ace
-
SHA1
7d543bf7d071386be7eb5da1cfa6daf052073fc0
-
SHA256
2f6fac8ccbebb2c958e9f53fe63c14f7d22498560f52e5e5839ef67db24c81ef
-
SHA512
cd012680bdc2867008e8decfe5386995117bb91dbdd251911740cfa66a917b940211128e04fe97e2109974f87439d524b5d69baa9be17e52d7bf473f7de4e888
-
SSDEEP
3072:H51yE5Mno95B0Z4tu6pxdJKnyqx/doHzaGLnaVRZiTyaUDeAg0FujD+VwzKqudF3:Hx5frpxdonyq4zaG2u5AOGeKTItZquqp
Static task
static1
Behavioral task
behavioral1
Sample
2f6fac8ccbebb2c958e9f53fe63c14f7d22498560f52e5e5839ef67db24c81ef.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2f6fac8ccbebb2c958e9f53fe63c14f7d22498560f52e5e5839ef67db24c81ef.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
pixelscloud
85.209.176.171:80
Targets
-
-
Target
2f6fac8ccbebb2c958e9f53fe63c14f7d22498560f52e5e5839ef67db24c81ef
-
Size
240KB
-
MD5
a66af10ad457a7491d0ccce208240ace
-
SHA1
7d543bf7d071386be7eb5da1cfa6daf052073fc0
-
SHA256
2f6fac8ccbebb2c958e9f53fe63c14f7d22498560f52e5e5839ef67db24c81ef
-
SHA512
cd012680bdc2867008e8decfe5386995117bb91dbdd251911740cfa66a917b940211128e04fe97e2109974f87439d524b5d69baa9be17e52d7bf473f7de4e888
-
SSDEEP
3072:H51yE5Mno95B0Z4tu6pxdJKnyqx/doHzaGLnaVRZiTyaUDeAg0FujD+VwzKqudF3:Hx5frpxdonyq4zaG2u5AOGeKTItZquqp
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1