General

  • Target

    46f74956efa2885efc1c931e45e1951dec995afe9d4276f4f05c473750852748

  • Size

    891KB

  • Sample

    231031-qr3wxsgc6v

  • MD5

    c7cbfb9791e4f6eeee9e63c755cf8118

  • SHA1

    1a562c323d492733d14e303da1e389fcedad33ad

  • SHA256

    46f74956efa2885efc1c931e45e1951dec995afe9d4276f4f05c473750852748

  • SHA512

    ce75516d291dc14bf2ed95aa8a80ef99915ba120bbdd0490724cd9499ae64c6463fd90a0a7952e970aadd116bf2c2982d38435f5626a15915d1404f96936c99e

  • SSDEEP

    12288:JtRaPchUomNwsC5pTGIlwIHvSv/3kagZU4C9rou2yvy60:j4o3mNwsC5pTGGzvyXgZUJ

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      46f74956efa2885efc1c931e45e1951dec995afe9d4276f4f05c473750852748

    • Size

      891KB

    • MD5

      c7cbfb9791e4f6eeee9e63c755cf8118

    • SHA1

      1a562c323d492733d14e303da1e389fcedad33ad

    • SHA256

      46f74956efa2885efc1c931e45e1951dec995afe9d4276f4f05c473750852748

    • SHA512

      ce75516d291dc14bf2ed95aa8a80ef99915ba120bbdd0490724cd9499ae64c6463fd90a0a7952e970aadd116bf2c2982d38435f5626a15915d1404f96936c99e

    • SSDEEP

      12288:JtRaPchUomNwsC5pTGIlwIHvSv/3kagZU4C9rou2yvy60:j4o3mNwsC5pTGGzvyXgZUJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks