General
-
Target
8c89889fcfc3b900503e3c915361c9149df4eda5d9403916c74b3f6921fad7e2
-
Size
1.4MB
-
Sample
231112-dvtffacf7v
-
MD5
6e2f4a49d1051cfcfcc8871329eb4eaf
-
SHA1
d93e98dd766a3e0a147f878ca75db6dd0947aef4
-
SHA256
8c89889fcfc3b900503e3c915361c9149df4eda5d9403916c74b3f6921fad7e2
-
SHA512
396f095139ff54672e678cec28c70213d1b84f31a9202b16ff4d87f877011823f9b2605a173c42084258cfa0c2a2bdd7d913163c543e8f233d6869c93ac9b6e0
-
SSDEEP
24576:Ay6cAFvvnhmFJbbuHePIsnWmGPIWDyWcfr/0zLPCjMaGWTamchZ5ftpxCR:H6cAFHnofHAegeTGnmWyOGX7Tam8BtC
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
8c89889fcfc3b900503e3c915361c9149df4eda5d9403916c74b3f6921fad7e2
-
Size
1.4MB
-
MD5
6e2f4a49d1051cfcfcc8871329eb4eaf
-
SHA1
d93e98dd766a3e0a147f878ca75db6dd0947aef4
-
SHA256
8c89889fcfc3b900503e3c915361c9149df4eda5d9403916c74b3f6921fad7e2
-
SHA512
396f095139ff54672e678cec28c70213d1b84f31a9202b16ff4d87f877011823f9b2605a173c42084258cfa0c2a2bdd7d913163c543e8f233d6869c93ac9b6e0
-
SSDEEP
24576:Ay6cAFvvnhmFJbbuHePIsnWmGPIWDyWcfr/0zLPCjMaGWTamchZ5ftpxCR:H6cAFHnofHAegeTGnmWyOGX7Tam8BtC
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2