General

  • Target

    c5ba83f3b662560019f464ff43773b68.bin

  • Size

    1.0MB

  • Sample

    231105-dlyzkaaa9z

  • MD5

    e180b11680e19c7ee178b1daaf7d5c63

  • SHA1

    0876ab15ed613fd69c70ac5f33909be71244b10f

  • SHA256

    3a1d313efbbc47abdc403488a7711a0575404fd04714ea520d5fc9ef60d9e301

  • SHA512

    0c89e4ade27bd74dd39e55846ffd5e92834b6c813631adc7beb907648f6d3033873d003c452a159defbbad7a6544686489a8fd00a74f9d07c98449e5dbac5c0d

  • SSDEEP

    24576:Xm7scMPXC6CbaXKBmbZt19sxzwl943Cl0UNQhP:XfBCDaXbZtIxEU4S9

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      ae93b377aa4aeb6d1c1dd333d951b62febb1e7717f43a4d6a6a33352c01f186f.exe

    • Size

      1.1MB

    • MD5

      c5ba83f3b662560019f464ff43773b68

    • SHA1

      e4b1ec9a5f65771c82311dee0902cef934bb7e3f

    • SHA256

      ae93b377aa4aeb6d1c1dd333d951b62febb1e7717f43a4d6a6a33352c01f186f

    • SHA512

      b2a23bcffd8789b648e909c5830a76a5f0112330c66fd8da26179ec7ce8b006bf914e0db21d3fa2ecacbdd543e05cb8eb4cce9285331d087daaebd96dc67235a

    • SSDEEP

      24576:jyI4C8bsrl4bQ4+1TBhkU3PHcybRmFqlfUBuZaz7tov:26hl4bQ9dfPHcFCLZad

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks