General

  • Target

    NEAS.08c889b632dc9b9c16201cdc93068390.exe

  • Size

    1.0MB

  • Sample

    231101-q6fpyahe2s

  • MD5

    08c889b632dc9b9c16201cdc93068390

  • SHA1

    94c36134d9b9c043c64fb6206ef79c84fbbecd77

  • SHA256

    d8e7c72ae6c805771de8471194d5025bd2ba6c5094890026899cde928ad03b19

  • SHA512

    babd79fc66423ab58cce0a48a4619a61e4a932f811135ccbc9b74abb395e35855f70c468b340d3c3a0c1a59a8b354049385402583a29cd448d8a8abf5f95acba

  • SSDEEP

    24576:kyqhgt0HBvSihggR14apDjh0beDuXWBj+3j40tuB/8T1o:zqkABv3v5WXX2+z4Y

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.08c889b632dc9b9c16201cdc93068390.exe

    • Size

      1.0MB

    • MD5

      08c889b632dc9b9c16201cdc93068390

    • SHA1

      94c36134d9b9c043c64fb6206ef79c84fbbecd77

    • SHA256

      d8e7c72ae6c805771de8471194d5025bd2ba6c5094890026899cde928ad03b19

    • SHA512

      babd79fc66423ab58cce0a48a4619a61e4a932f811135ccbc9b74abb395e35855f70c468b340d3c3a0c1a59a8b354049385402583a29cd448d8a8abf5f95acba

    • SSDEEP

      24576:kyqhgt0HBvSihggR14apDjh0beDuXWBj+3j40tuB/8T1o:zqkABv3v5WXX2+z4Y

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks