General
-
Target
1b1b42ee10d84fece170ed60b725b66e1c4b3f1f1c4af3c23110a2607730e64d
-
Size
1.4MB
-
Sample
231112-f2shtsdf27
-
MD5
95a1b8a592613ba94af6e4c44d0ec42e
-
SHA1
1c403f399e9290aa4e752285a8d009fd05ae2456
-
SHA256
1b1b42ee10d84fece170ed60b725b66e1c4b3f1f1c4af3c23110a2607730e64d
-
SHA512
d95974b93634de1249938030b3f08fab404b1dbd76c2495bacea25b4b616b48b3fe8947d1a756ed57327f1b1c5b54f2f54e4548c6bd42309ef2e66c0f28e2b93
-
SSDEEP
24576:0yryfd5vAyzrtyfFnOe6Ist8IGjTGDsMTeUq6ysRgDtN7UMdAvK6UIpQ:DrqvAAU9OeBQxGe3ZF4tTejJ
Static task
static1
Behavioral task
behavioral1
Sample
1b1b42ee10d84fece170ed60b725b66e1c4b3f1f1c4af3c23110a2607730e64d.exe
Resource
win10-20231020-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
1b1b42ee10d84fece170ed60b725b66e1c4b3f1f1c4af3c23110a2607730e64d
-
Size
1.4MB
-
MD5
95a1b8a592613ba94af6e4c44d0ec42e
-
SHA1
1c403f399e9290aa4e752285a8d009fd05ae2456
-
SHA256
1b1b42ee10d84fece170ed60b725b66e1c4b3f1f1c4af3c23110a2607730e64d
-
SHA512
d95974b93634de1249938030b3f08fab404b1dbd76c2495bacea25b4b616b48b3fe8947d1a756ed57327f1b1c5b54f2f54e4548c6bd42309ef2e66c0f28e2b93
-
SSDEEP
24576:0yryfd5vAyzrtyfFnOe6Ist8IGjTGDsMTeUq6ysRgDtN7UMdAvK6UIpQ:DrqvAAU9OeBQxGe3ZF4tTejJ
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2