General
-
Target
eebeb8a4c2d675359898af720a687c24a7dcf71d7907cbd2c1dd747aaecf8984
-
Size
1.4MB
-
Sample
231111-zycgzsbe9y
-
MD5
d8ae5fbe07fe91f238d6f9e42ad1d19e
-
SHA1
57a2525dc368a90518b576d4301e62b39614cccf
-
SHA256
eebeb8a4c2d675359898af720a687c24a7dcf71d7907cbd2c1dd747aaecf8984
-
SHA512
d51f65267e6b39baf70c4aeaaa8a934be27233ab21e942e4c60bdebdb8af429d9a268b26315de2d5455ba92317d3de915266998a36ef7119b8b7e40b064aa755
-
SSDEEP
24576:YyqXWtSUOMlgRiz2BM7otX0/Qje3IsN6FGCwyDEF2PeggejT3uFW5t9y852kgW/e:fqXQOMZUtGoeYYaGSY03genv0852/yD
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
eebeb8a4c2d675359898af720a687c24a7dcf71d7907cbd2c1dd747aaecf8984
-
Size
1.4MB
-
MD5
d8ae5fbe07fe91f238d6f9e42ad1d19e
-
SHA1
57a2525dc368a90518b576d4301e62b39614cccf
-
SHA256
eebeb8a4c2d675359898af720a687c24a7dcf71d7907cbd2c1dd747aaecf8984
-
SHA512
d51f65267e6b39baf70c4aeaaa8a934be27233ab21e942e4c60bdebdb8af429d9a268b26315de2d5455ba92317d3de915266998a36ef7119b8b7e40b064aa755
-
SSDEEP
24576:YyqXWtSUOMlgRiz2BM7otX0/Qje3IsN6FGCwyDEF2PeggejT3uFW5t9y852kgW/e:fqXQOMZUtGoeYYaGSY03genv0852/yD
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1