General
-
Target
197b8c7bb8aacfed16b96b38c74c80e4bf725474340c2f41abf47671f418f86b
-
Size
1.4MB
-
Sample
231112-12pr6acg2w
-
MD5
7dfd5fcf6f435e387713049d9df862be
-
SHA1
5c07d5a1eeef9b2100c84dcab7b1f8d6aac6e86c
-
SHA256
197b8c7bb8aacfed16b96b38c74c80e4bf725474340c2f41abf47671f418f86b
-
SHA512
dcdaf96f8511f3de4dbc722e90b641537b8e1880997a0d5bbe358fd7d061cbf3a2475fe2c1694ff555ba798311d4f5420b141719ff0c03b000fd0ec50bafd362
-
SSDEEP
24576:Ry2eUcS9M+D4e1IssakGl7CDUC2W/tlZQzy7N3fGxksMRLQ+KnD7m34Ih:E2Xtoe2DrGUr2aQMdRsz+K3c
Static task
static1
Behavioral task
behavioral1
Sample
197b8c7bb8aacfed16b96b38c74c80e4bf725474340c2f41abf47671f418f86b.exe
Resource
win10-20231020-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
up3
Targets
-
-
Target
197b8c7bb8aacfed16b96b38c74c80e4bf725474340c2f41abf47671f418f86b
-
Size
1.4MB
-
MD5
7dfd5fcf6f435e387713049d9df862be
-
SHA1
5c07d5a1eeef9b2100c84dcab7b1f8d6aac6e86c
-
SHA256
197b8c7bb8aacfed16b96b38c74c80e4bf725474340c2f41abf47671f418f86b
-
SHA512
dcdaf96f8511f3de4dbc722e90b641537b8e1880997a0d5bbe358fd7d061cbf3a2475fe2c1694ff555ba798311d4f5420b141719ff0c03b000fd0ec50bafd362
-
SSDEEP
24576:Ry2eUcS9M+D4e1IssakGl7CDUC2W/tlZQzy7N3fGxksMRLQ+KnD7m34Ih:E2Xtoe2DrGUr2aQMdRsz+K3c
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-