General
-
Target
b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38
-
Size
1.5MB
-
Sample
231101-rqtgjaba66
-
MD5
9f2ef6f9061b9b824b6cb1aa8692bd3e
-
SHA1
8a41c8837334c3faf3600a13216017bb96372b95
-
SHA256
63b8573f2eac7d8c75a262cd9825296e7ee71c07025453c366100a9b4449831e
-
SHA512
71d22888591d7b2b9a9e3fb9155b319a943f7ff99e51991edb42979eac35f8c1039d60e33bfdefe0e33357187dfd291df35d0459da0dcd06505ccd7d60bd6bf6
-
SSDEEP
49152:YdFq41UdUARHwtmzlpVKsA/aeicefUExAIsjHLaE:j4KUAr7YnyVcetxngraE
Static task
static1
Behavioral task
behavioral1
Sample
b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Targets
-
-
Target
b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38
-
Size
1.5MB
-
MD5
08343869ec9cbc12aadda90e3b2a8415
-
SHA1
5ee6fbbc8eae76bd228912ce0afb32adc88710dd
-
SHA256
b1003b910355b4a0ef5ee0bc887bc1a76d4b6cbffcaebfa74748d0d12d3b9a38
-
SHA512
6138d3172e2da8bfb2cf7ca864a4e91884c51e6b43847086d6d2dbaa6076a1568bdc7a57868dc8cbd867e8e939a80cb2a28b98fa8186399b1d518a8fa1c7c491
-
SSDEEP
49152:A+YEm41de+rRwtcl8hKrI7v3WvG+Ex4IsfHLa:Jm4fe+vl8U87eix/ira
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1