General
-
Target
NEAS.45116227ca494c9ce1885a027a923a70.exe
-
Size
1.0MB
-
Sample
231101-q97ylabd9t
-
MD5
45116227ca494c9ce1885a027a923a70
-
SHA1
2549fe6532c4911ecee89e703ef90214ef5ea021
-
SHA256
98fd7078a33e9ba1754361e16b2fe2eb78a373102eb859e96e9d2b379edb0a5b
-
SHA512
a6852ee760c4b234bd1ce8eae1c81eed6b0045f74a0e3e79815026c5e2e677b17bb8463c899e2b844f1fda66b69ed1d343867293aaab41a1bf3e7eae62814cae
-
SSDEEP
24576:ZyET8NE0vYyQiR5gEq+agu2HMYF6Mjhu+xye2N:M28DYy+w7Fb3
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.45116227ca494c9ce1885a027a923a70.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Targets
-
-
Target
NEAS.45116227ca494c9ce1885a027a923a70.exe
-
Size
1.0MB
-
MD5
45116227ca494c9ce1885a027a923a70
-
SHA1
2549fe6532c4911ecee89e703ef90214ef5ea021
-
SHA256
98fd7078a33e9ba1754361e16b2fe2eb78a373102eb859e96e9d2b379edb0a5b
-
SHA512
a6852ee760c4b234bd1ce8eae1c81eed6b0045f74a0e3e79815026c5e2e677b17bb8463c899e2b844f1fda66b69ed1d343867293aaab41a1bf3e7eae62814cae
-
SSDEEP
24576:ZyET8NE0vYyQiR5gEq+agu2HMYF6Mjhu+xye2N:M28DYy+w7Fb3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1