General
-
Target
282ec5626fba2193af3b126e06382137e7bd700f09d6029b882ffacb4fe32b84
-
Size
1.4MB
-
Sample
231112-rtwfasha94
-
MD5
5513492465b35f51562a56ca8ae72569
-
SHA1
1131fb465d9a478df5cea0b4ccebdd8c2b7be3d1
-
SHA256
282ec5626fba2193af3b126e06382137e7bd700f09d6029b882ffacb4fe32b84
-
SHA512
4f562a9368f4fbc64394e3db0842da0ad74ecf8fa9a25d2f11f7c6e5aaa434d63f1dfb0c89e0ec7c6e34636614e82a494286dd16704de2c97ae872d767684180
-
SSDEEP
24576:nychd/kkjYUFXo0kTwceKIsiVqG1r0D1tILrgY0uSrWlEk3sYg0wnwO:ym/khUFXiXeRvEGmxtsppvX8n
Static task
static1
Behavioral task
behavioral1
Sample
282ec5626fba2193af3b126e06382137e7bd700f09d6029b882ffacb4fe32b84.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
282ec5626fba2193af3b126e06382137e7bd700f09d6029b882ffacb4fe32b84
-
Size
1.4MB
-
MD5
5513492465b35f51562a56ca8ae72569
-
SHA1
1131fb465d9a478df5cea0b4ccebdd8c2b7be3d1
-
SHA256
282ec5626fba2193af3b126e06382137e7bd700f09d6029b882ffacb4fe32b84
-
SHA512
4f562a9368f4fbc64394e3db0842da0ad74ecf8fa9a25d2f11f7c6e5aaa434d63f1dfb0c89e0ec7c6e34636614e82a494286dd16704de2c97ae872d767684180
-
SSDEEP
24576:nychd/kkjYUFXo0kTwceKIsiVqG1r0D1tILrgY0uSrWlEk3sYg0wnwO:ym/khUFXiXeRvEGmxtsppvX8n
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-