General
-
Target
file
-
Size
1.3MB
-
Sample
231012-kw7g1shh5y
-
MD5
ba9fe6ef94fe7823b804a68264e901f9
-
SHA1
872d452bbba5d325bf4fd8d1579be007c969ccbc
-
SHA256
659f0f9e427722eab6a23d86da26aad8776993035e00bae97a8e41f5c937e386
-
SHA512
a25b1a243473e67149fd34b336003a7fa167b53b74e29e32ded6330756b8c4950210145e4cbf40a154d349eccc24441eb26681081c8a5e09de6d02f0be3a4867
-
SSDEEP
24576:iyqdhcP1YfDz/qEUJjOg7r8VTLSwKC+WHib3GJsuqC:JqdhcWbzCEUpOg7r8F+a+W+3
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Targets
-
-
Target
file
-
Size
1.3MB
-
MD5
ba9fe6ef94fe7823b804a68264e901f9
-
SHA1
872d452bbba5d325bf4fd8d1579be007c969ccbc
-
SHA256
659f0f9e427722eab6a23d86da26aad8776993035e00bae97a8e41f5c937e386
-
SHA512
a25b1a243473e67149fd34b336003a7fa167b53b74e29e32ded6330756b8c4950210145e4cbf40a154d349eccc24441eb26681081c8a5e09de6d02f0be3a4867
-
SSDEEP
24576:iyqdhcP1YfDz/qEUJjOg7r8VTLSwKC+WHib3GJsuqC:JqdhcWbzCEUpOg7r8F+a+W+3
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1