General

  • Target

    Redline_secondary_3.zip

  • Size

    1.5MB

  • Sample

    231107-rv5elahf5t

  • MD5

    e9202953b85cd02b362e607adaab6d1d

  • SHA1

    dff5887e69ce5d0c723ddf80032c6734de2c82b6

  • SHA256

    584346c6164d1cb267444f383c60f6c8a307ccb3468dc3bf6dc8764eb3344942

  • SHA512

    858e890ded97f9b9def0853136d0a7e0944995fe98ff6d91a11f2943224dbbd0f0f3ec8575ca3bb9aebd54ba57845412569bd33672fdec379010bc77efb67d47

  • SSDEEP

    24576:bPAhrJ3Ufd2MddhZXWpMUMmIZNVQn9h19hj/O1PkoxeSNkFzC5w3kle2IH:bPA5toP7mpMdmIo9h19V/JoNYzC5wX22

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Targets

    • Target

      f7864ce4882075fe298e7d312067b9ca244e15aaf4884d755f372580f34a42bd.exe

    • Size

      1.5MB

    • MD5

      dc4c0f94d78b9d9161b48555938b321f

    • SHA1

      ca6fc671ee78c356e81dc7173fc832e9122bff8c

    • SHA256

      f7864ce4882075fe298e7d312067b9ca244e15aaf4884d755f372580f34a42bd

    • SHA512

      4ef1a5b0741de78a7370222ba2793526865fb19403608deab2fc229fd430dca89eb752510a7eb54e02c4bec447cd32a27ef3fe76106efcb88c3e443cda0227d8

    • SSDEEP

      49152:ZkbAMl2JlMT+4HL767AbCA9kEPR7zNzL:zLl6jUsCA9kEp7zN

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks