General
-
Target
4a7d7e170aefb6211578cf310859024b32916b1aa58774fadef012877db3afdf
-
Size
942KB
-
Sample
231102-q3lrsacf91
-
MD5
065f83d071191397941e89505838a977
-
SHA1
339db25a56814a4abc658603ec222a1cd192cd34
-
SHA256
4a7d7e170aefb6211578cf310859024b32916b1aa58774fadef012877db3afdf
-
SHA512
3f6f54621805285a7d230d97c19a9c4101dd63bd2f68fe1c6cea63b035b30e145d8db193fbde58007d56867ba71fb8be21df9b4d4a11562a21ee50439d6c78a2
-
SSDEEP
12288:D72y6T2E/mNwqKbov27C9OV266iq00ARW8jvBvGg5FEzzWuM1EKFj6:/2y6tmNw3bov27HVW3IRW8jP5FE30J
Static task
static1
Behavioral task
behavioral1
Sample
4a7d7e170aefb6211578cf310859024b32916b1aa58774fadef012877db3afdf.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
plost
77.91.124.86:19084
Extracted
redline
kedru
77.91.124.86:19084
Targets
-
-
Target
4a7d7e170aefb6211578cf310859024b32916b1aa58774fadef012877db3afdf
-
Size
942KB
-
MD5
065f83d071191397941e89505838a977
-
SHA1
339db25a56814a4abc658603ec222a1cd192cd34
-
SHA256
4a7d7e170aefb6211578cf310859024b32916b1aa58774fadef012877db3afdf
-
SHA512
3f6f54621805285a7d230d97c19a9c4101dd63bd2f68fe1c6cea63b035b30e145d8db193fbde58007d56867ba71fb8be21df9b4d4a11562a21ee50439d6c78a2
-
SSDEEP
12288:D72y6T2E/mNwqKbov27C9OV266iq00ARW8jvBvGg5FEzzWuM1EKFj6:/2y6tmNw3bov27HVW3IRW8jP5FE30J
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-