General
-
Target
462775da57daa6fba336ad88e62f95256834160417f94a07b5c34891e2887814
-
Size
1.5MB
-
Sample
231101-wzc85abe6t
-
MD5
d7b9e80cf2f7faf078630caa223bb4c7
-
SHA1
7a57ffefbba02ab9e01c5587e85f1c1c51b8df71
-
SHA256
ae0ab06b1b25513a17b11b0958cbef553d2c815adc8d7d421070ed1ef47ea9f5
-
SHA512
f9ffb5b4bb46e9cb433a8328e25acaf6baf40d80117813318aae58062e0e10e3caf226672cf4a62c6da3f94b5855fdf86ef59b05ce13b2989adb285bf88dec0c
-
SSDEEP
24576:dyFhdE7HB4K3yUaNqvoHZj+qKmMxygUdHUJMTCW7E1Ze2+jw/+f:4FhayKraNqvuZJ7S6HUJM5E1Z24+f
Static task
static1
Behavioral task
behavioral1
Sample
462775da57daa6fba336ad88e62f95256834160417f94a07b5c34891e2887814.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Targets
-
-
Target
462775da57daa6fba336ad88e62f95256834160417f94a07b5c34891e2887814
-
Size
1.5MB
-
MD5
f5f0c412eef5d991ae6e8677ff9d5d12
-
SHA1
80bfc92a37f53fde55a2856f696d4028310dacc6
-
SHA256
462775da57daa6fba336ad88e62f95256834160417f94a07b5c34891e2887814
-
SHA512
771729d0ec9662dd41c7d0267a72816ecde7c7d50efb91d1a2d11d7d464ee8138c2c28bed21e1a5f4aeb55f74ca9ac798479e4ba760e4a43c66b47f3301bb71a
-
SSDEEP
24576:eye2hJEnB0z+yT7qvo9DjCqf2MxogUhHUJQgsZr1qyMD2ojwWRHl:tlh7zbqvkD9+SWHUJaDM7JRH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1