General

  • Target

    44ecd32c6fa385d1db148545bf8071bc4eb0a5459997a7d715aa4b38e3216f15

  • Size

    1.4MB

  • Sample

    231101-v7mxvsbb5z

  • MD5

    34177e4b50df8ed2292d5b836151ee38

  • SHA1

    f8b67d87593a550fa9fc09ca14184a6f787b2d2f

  • SHA256

    44ecd32c6fa385d1db148545bf8071bc4eb0a5459997a7d715aa4b38e3216f15

  • SHA512

    3e8bb69a93a9f855aa1f3419c55549fc4c7c4d1178a5aa601a2a26a50c9782d8c541be4fa0bcc69debe27428c26dc98f53a0a23743a666cb8f5107ed65ca87ad

  • SSDEEP

    24576:iyj8Cfnysrgytyk3dHsqa1CLcIdmL/5n6/jm46sVl5Ecf/a+QFNDNf/9:JjZfysrdyo2pIds16bS2vHfi+QFJl/

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      44ecd32c6fa385d1db148545bf8071bc4eb0a5459997a7d715aa4b38e3216f15

    • Size

      1.4MB

    • MD5

      34177e4b50df8ed2292d5b836151ee38

    • SHA1

      f8b67d87593a550fa9fc09ca14184a6f787b2d2f

    • SHA256

      44ecd32c6fa385d1db148545bf8071bc4eb0a5459997a7d715aa4b38e3216f15

    • SHA512

      3e8bb69a93a9f855aa1f3419c55549fc4c7c4d1178a5aa601a2a26a50c9782d8c541be4fa0bcc69debe27428c26dc98f53a0a23743a666cb8f5107ed65ca87ad

    • SSDEEP

      24576:iyj8Cfnysrgytyk3dHsqa1CLcIdmL/5n6/jm46sVl5Ecf/a+QFNDNf/9:JjZfysrdyo2pIds16bS2vHfi+QFJl/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks