General
-
Target
9606f550ed2306e056df143bddba13c0.bin
-
Size
1.4MB
-
Sample
231106-cp45bahd45
-
MD5
9606f550ed2306e056df143bddba13c0
-
SHA1
2a3a87c902578c80236455865d5d5272114a17cd
-
SHA256
239f1eaada9eb7c1fcf44d3d1f61641ccda51b2edc02ae7c753d201f7ff09270
-
SHA512
5905ad65b1cc8e2851ddacd5287c87ff105071c9e41dbb127a684579f5f48c5942e6c7dae6294c28117b110da4154ff90f3792a5a8b941ed384a5b719e4e8327
-
SSDEEP
24576:sy3HRut2IEeIbQxsX5YYWaxVUJguL9d8/+AVgw3keMyIo6fZ/XLBmp7cnu:b3R42ReIbQqYRaTohe3Vgw0eMyIoS/
Static task
static1
Behavioral task
behavioral1
Sample
9606f550ed2306e056df143bddba13c0.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
plost
77.91.124.86:19084
Targets
-
-
Target
9606f550ed2306e056df143bddba13c0.bin
-
Size
1.4MB
-
MD5
9606f550ed2306e056df143bddba13c0
-
SHA1
2a3a87c902578c80236455865d5d5272114a17cd
-
SHA256
239f1eaada9eb7c1fcf44d3d1f61641ccda51b2edc02ae7c753d201f7ff09270
-
SHA512
5905ad65b1cc8e2851ddacd5287c87ff105071c9e41dbb127a684579f5f48c5942e6c7dae6294c28117b110da4154ff90f3792a5a8b941ed384a5b719e4e8327
-
SSDEEP
24576:sy3HRut2IEeIbQxsX5YYWaxVUJguL9d8/+AVgw3keMyIo6fZ/XLBmp7cnu:b3R42ReIbQqYRaTohe3Vgw0eMyIoS/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1