General

  • Target

    c2c322bbd9d0f85c368faacf7ed67bb008b8df59b454eea7434a4630730b44ce

  • Size

    957KB

  • Sample

    231102-anw17see9z

  • MD5

    4f76ad74d8e5f900d3102da9305dca0a

  • SHA1

    3a35d910edf703287a51fa43c5862624a75fbcfa

  • SHA256

    c2c322bbd9d0f85c368faacf7ed67bb008b8df59b454eea7434a4630730b44ce

  • SHA512

    312b46565e75dbb4851435b9d3369f1d2c5ad72c63285a7eddc591241901ca8f4b9ab8485d73c828b838d33cc6a5e8d829a6c36ea3342a5d6e59245a2be92600

  • SSDEEP

    12288:Rbcxko2dAKlpItf+BV3XHSlHYBPHJqXbmxoRj3cQpRnRu9cdTH4:qxL2dAK4tf+BVHHkIoRj3cQD

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      c2c322bbd9d0f85c368faacf7ed67bb008b8df59b454eea7434a4630730b44ce

    • Size

      957KB

    • MD5

      4f76ad74d8e5f900d3102da9305dca0a

    • SHA1

      3a35d910edf703287a51fa43c5862624a75fbcfa

    • SHA256

      c2c322bbd9d0f85c368faacf7ed67bb008b8df59b454eea7434a4630730b44ce

    • SHA512

      312b46565e75dbb4851435b9d3369f1d2c5ad72c63285a7eddc591241901ca8f4b9ab8485d73c828b838d33cc6a5e8d829a6c36ea3342a5d6e59245a2be92600

    • SSDEEP

      12288:Rbcxko2dAKlpItf+BV3XHSlHYBPHJqXbmxoRj3cQpRnRu9cdTH4:qxL2dAK4tf+BVHHkIoRj3cQD

    • Detected google phishing page

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks