General

  • Target

    NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe

  • Size

    1.0MB

  • Sample

    231105-j7smkafa32

  • MD5

    a62c55b2953d1f6da46b9db369d3ca70

  • SHA1

    8ff595e13a5918d8535574547305dc7c79595bc8

  • SHA256

    93f885ae3dfb2fd41956200e4870d013d058d5e7676db722eb3c8f065ff2cb38

  • SHA512

    70c650c70fef4d42449bc974dfddaf0fc1e0eadeb055cc262ba27c3b583d39fe2e725c784b56ec41e3511cf57decbf2009e30ed50a1db55a219a5a42fa00cdf8

  • SSDEEP

    24576:Syu61F0Y6TvT9raWiL3NYLXqiNOKiKYPDn001W:5XDP6T79raz3aL3NqPL001

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe

    • Size

      1.0MB

    • MD5

      a62c55b2953d1f6da46b9db369d3ca70

    • SHA1

      8ff595e13a5918d8535574547305dc7c79595bc8

    • SHA256

      93f885ae3dfb2fd41956200e4870d013d058d5e7676db722eb3c8f065ff2cb38

    • SHA512

      70c650c70fef4d42449bc974dfddaf0fc1e0eadeb055cc262ba27c3b583d39fe2e725c784b56ec41e3511cf57decbf2009e30ed50a1db55a219a5a42fa00cdf8

    • SSDEEP

      24576:Syu61F0Y6TvT9raWiL3NYLXqiNOKiKYPDn001W:5XDP6T79raz3aL3NqPL001

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks