General

  • Target

    NEAS.b8c62753f5a954e224c3efbf52ed5700.exe

  • Size

    1.0MB

  • Sample

    231101-rmdxnsgg67

  • MD5

    b8c62753f5a954e224c3efbf52ed5700

  • SHA1

    c9991ae328b6646bf92e2d0be6f117c9eb9f66f3

  • SHA256

    ffbe9c91ba7e148f96cc3d30cff0d171a3aa7474477992d45b6e99e6d1f22143

  • SHA512

    b5fe33690fc09dcb62fe5eee3a31c58ffa11e020b7ed8273c8ded3d3de814bc8f098876e72d850625020e0375f6d3e2e33e9b271397e618e904a3d64ca721038

  • SSDEEP

    24576:4yoCqO6p/2eHilFTAAdaE4qXH3sZ5vraK6lhpXhF:/oxr2eIn07mlhp

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.b8c62753f5a954e224c3efbf52ed5700.exe

    • Size

      1.0MB

    • MD5

      b8c62753f5a954e224c3efbf52ed5700

    • SHA1

      c9991ae328b6646bf92e2d0be6f117c9eb9f66f3

    • SHA256

      ffbe9c91ba7e148f96cc3d30cff0d171a3aa7474477992d45b6e99e6d1f22143

    • SHA512

      b5fe33690fc09dcb62fe5eee3a31c58ffa11e020b7ed8273c8ded3d3de814bc8f098876e72d850625020e0375f6d3e2e33e9b271397e618e904a3d64ca721038

    • SSDEEP

      24576:4yoCqO6p/2eHilFTAAdaE4qXH3sZ5vraK6lhpXhF:/oxr2eIn07mlhp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks