General
-
Target
754aac7cd0fa9a1a4ee380444a4b724e6eb38500dea7a6358ab7a504bd8e373e
-
Size
1.4MB
-
Sample
231112-gl2bgada2v
-
MD5
313564a05c7df891c42377a8ea8ccab8
-
SHA1
42ad77d3ffc4efa445ca2198e128b03a79e86ab9
-
SHA256
754aac7cd0fa9a1a4ee380444a4b724e6eb38500dea7a6358ab7a504bd8e373e
-
SHA512
fabc72a14d59e8f1e6b27f5438be1bb95c0cb5eb77c6cf419188c35152d24c78c66f7e9e9ad397064d2ab263c6d3faa422a91ec840f28c0b70f461356064d8b5
-
SSDEEP
24576:/yhiybKkdbZjrUQqvefIs+8lGpNRDXIeul3ZWmnGJmTP4veByws:KoudbdrVYewpKGhkzXGJKow
Static task
static1
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
754aac7cd0fa9a1a4ee380444a4b724e6eb38500dea7a6358ab7a504bd8e373e
-
Size
1.4MB
-
MD5
313564a05c7df891c42377a8ea8ccab8
-
SHA1
42ad77d3ffc4efa445ca2198e128b03a79e86ab9
-
SHA256
754aac7cd0fa9a1a4ee380444a4b724e6eb38500dea7a6358ab7a504bd8e373e
-
SHA512
fabc72a14d59e8f1e6b27f5438be1bb95c0cb5eb77c6cf419188c35152d24c78c66f7e9e9ad397064d2ab263c6d3faa422a91ec840f28c0b70f461356064d8b5
-
SSDEEP
24576:/yhiybKkdbZjrUQqvefIs+8lGpNRDXIeul3ZWmnGJmTP4veByws:KoudbdrVYewpKGhkzXGJKow
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1