General

  • Target

    9606f550ed2306e056df143bddba13c0.bin

  • Size

    1.4MB

  • Sample

    231106-cp45bahd45

  • MD5

    9606f550ed2306e056df143bddba13c0

  • SHA1

    2a3a87c902578c80236455865d5d5272114a17cd

  • SHA256

    239f1eaada9eb7c1fcf44d3d1f61641ccda51b2edc02ae7c753d201f7ff09270

  • SHA512

    5905ad65b1cc8e2851ddacd5287c87ff105071c9e41dbb127a684579f5f48c5942e6c7dae6294c28117b110da4154ff90f3792a5a8b941ed384a5b719e4e8327

  • SSDEEP

    24576:sy3HRut2IEeIbQxsX5YYWaxVUJguL9d8/+AVgw3keMyIo6fZ/XLBmp7cnu:b3R42ReIbQqYRaTohe3Vgw0eMyIoS/

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

plost

C2

77.91.124.86:19084

Targets

    • Target

      9606f550ed2306e056df143bddba13c0.bin

    • Size

      1.4MB

    • MD5

      9606f550ed2306e056df143bddba13c0

    • SHA1

      2a3a87c902578c80236455865d5d5272114a17cd

    • SHA256

      239f1eaada9eb7c1fcf44d3d1f61641ccda51b2edc02ae7c753d201f7ff09270

    • SHA512

      5905ad65b1cc8e2851ddacd5287c87ff105071c9e41dbb127a684579f5f48c5942e6c7dae6294c28117b110da4154ff90f3792a5a8b941ed384a5b719e4e8327

    • SSDEEP

      24576:sy3HRut2IEeIbQxsX5YYWaxVUJguL9d8/+AVgw3keMyIo6fZ/XLBmp7cnu:b3R42ReIbQqYRaTohe3Vgw0eMyIoS/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks