General
-
Target
175281d6c0cd579918fc68af965513837891a34201ef9bda03add962af33a279
-
Size
1.4MB
-
Sample
231112-bjgw6ach83
-
MD5
15c338487c897a35f1ef03652acea4cf
-
SHA1
e76690337f01021a81f03dc4d56dcf869bf77d35
-
SHA256
175281d6c0cd579918fc68af965513837891a34201ef9bda03add962af33a279
-
SHA512
28ee573810119b8c17b43ab9ee6c6000daa5252f600af3946621c8f1921200825bfd74b896886f58eaddeb2c8429528e3393c972325c4d135b6b76b7b2ea164a
-
SSDEEP
24576:Gy2y8rlpjRHvJEIJVeVIsQQ1GDr7DXP+6ir8UFhN77zFVx+tokI6tUQ0Fe1J5:V/clDh53eWZGGjbP+6ioIR+okI6t
Static task
static1
Behavioral task
behavioral1
Sample
175281d6c0cd579918fc68af965513837891a34201ef9bda03add962af33a279.exe
Resource
win10-20231023-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
175281d6c0cd579918fc68af965513837891a34201ef9bda03add962af33a279
-
Size
1.4MB
-
MD5
15c338487c897a35f1ef03652acea4cf
-
SHA1
e76690337f01021a81f03dc4d56dcf869bf77d35
-
SHA256
175281d6c0cd579918fc68af965513837891a34201ef9bda03add962af33a279
-
SHA512
28ee573810119b8c17b43ab9ee6c6000daa5252f600af3946621c8f1921200825bfd74b896886f58eaddeb2c8429528e3393c972325c4d135b6b76b7b2ea164a
-
SSDEEP
24576:Gy2y8rlpjRHvJEIJVeVIsQQ1GDr7DXP+6ir8UFhN77zFVx+tokI6tUQ0Fe1J5:V/clDh53eWZGGjbP+6ioIR+okI6t
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2