General

  • Target

    NEAS.bba8c817e01b2c540199232494677660.exe

  • Size

    650KB

  • Sample

    231101-rmkp8agh55

  • MD5

    bba8c817e01b2c540199232494677660

  • SHA1

    378af0839a2eab5dc616c799cb1478012ceb2464

  • SHA256

    d1b8c5f5be61dacf1667179cb9aa645cd0248bd8932888fe7764c58721d5b1a7

  • SHA512

    ba8f54f9f6f074a48cc5bab4555796bcb240408f56722852077ad42c46751bf3f0fce5fdd5ac67fad8f95a3164ed5e8885de4a238d0ee1ab9ededad0efe29c8d

  • SSDEEP

    12288:UMrWy900uWXmg8QCiImyTv6Y2yE7R2Jav4TukSVTT28xcjAFx48QzmaHvQJMa:6y99XmBhiIT32RqamupVmYENHvsMa

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.bba8c817e01b2c540199232494677660.exe

    • Size

      650KB

    • MD5

      bba8c817e01b2c540199232494677660

    • SHA1

      378af0839a2eab5dc616c799cb1478012ceb2464

    • SHA256

      d1b8c5f5be61dacf1667179cb9aa645cd0248bd8932888fe7764c58721d5b1a7

    • SHA512

      ba8f54f9f6f074a48cc5bab4555796bcb240408f56722852077ad42c46751bf3f0fce5fdd5ac67fad8f95a3164ed5e8885de4a238d0ee1ab9ededad0efe29c8d

    • SSDEEP

      12288:UMrWy900uWXmg8QCiImyTv6Y2yE7R2Jav4TukSVTT28xcjAFx48QzmaHvQJMa:6y99XmBhiIT32RqamupVmYENHvsMa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks