General
-
Target
8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c
-
Size
1.2MB
-
Sample
231013-n4tsnshb8y
-
MD5
75469f0fb2ec18baf4f6d7bf9bd9c77b
-
SHA1
ab30531e3c35bb70e2ae846bf919c2ecb83120f6
-
SHA256
0066c0880ff8b9f2e79d8546011cfb21ce24c1bb57d6af5fa2e14a6075d4eca5
-
SHA512
3de33cc7e29a9785b9d52e5aefca663be32b3938f959fceb4acecf9101e50e47893883676c41e6e5c3a42b8c24223eb9912cdbc30b7617043e803500b2c113d3
-
SSDEEP
24576:U+yJYyYDQa+VW4IEiPx7lZUIBtKV1JwMUiiKLzH3kv+AgfyPKknEeT3YGYdPuRj:K+zOVWzRx7lZPBtkaSL4v+AgfA53IdP0
Static task
static1
Behavioral task
behavioral1
Sample
8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Extracted
redline
pixelscloud
85.209.176.171:80
Targets
-
-
Target
8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c
-
Size
1.3MB
-
MD5
f51f4b013f50935de63004231ff215ac
-
SHA1
acb35c3c9d52804a46b817413675fcb97eb8347b
-
SHA256
8e2250e4bfca311f733166f8efc5aa7ae8af382f6ec4b00bb7fa7c782c4ac50c
-
SHA512
733c16238e9e0861c5d5944cf66d108d1f2c4b032b33e1f20c3ef2a3f3b2cc1939de83af075781c869c6fcd1a0f21b9d821e56b0db3ecf05617e557b8f8790b1
-
SSDEEP
24576:0yR/69Eq+VC4sE0xTRlZUIBH451nwCgiiKJznv6Ag7F2UnEeFDYTl4RW:Ds6VCRPTRlZPBHosSJDv6AgfcTl4
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1