General
-
Target
NEAS.7c948da84e336ddde18db89ad5bd132002e9393abb5c614d1d74c2005e358b36.exe
-
Size
1.4MB
-
Sample
231112-w7yj2aah67
-
MD5
47da995cd1ec9844afa37b1020042c24
-
SHA1
a52e4675ba91565e854d25c2953f3a22aadc03a1
-
SHA256
7c948da84e336ddde18db89ad5bd132002e9393abb5c614d1d74c2005e358b36
-
SHA512
b61c9e6107b1c67507a556b19da1f0d80c3800aebb8370d8abb36c301a700836a103c3be739da8a464d1a1a8000f349f7ad5e6227001c26a37d87c1394294dea
-
SSDEEP
24576:KyWGaUMSIAdBRN4FBuBeDIsRqNGGbSDTJDnX0PkVRE30sr/nwQqJVKTDBY9gzytI:RFaUMSD4bGesUKGZ3JDnXAXvTtY95
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7c948da84e336ddde18db89ad5bd132002e9393abb5c614d1d74c2005e358b36.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
up3
Targets
-
-
Target
NEAS.7c948da84e336ddde18db89ad5bd132002e9393abb5c614d1d74c2005e358b36.exe
-
Size
1.4MB
-
MD5
47da995cd1ec9844afa37b1020042c24
-
SHA1
a52e4675ba91565e854d25c2953f3a22aadc03a1
-
SHA256
7c948da84e336ddde18db89ad5bd132002e9393abb5c614d1d74c2005e358b36
-
SHA512
b61c9e6107b1c67507a556b19da1f0d80c3800aebb8370d8abb36c301a700836a103c3be739da8a464d1a1a8000f349f7ad5e6227001c26a37d87c1394294dea
-
SSDEEP
24576:KyWGaUMSIAdBRN4FBuBeDIsRqNGGbSDTJDnX0PkVRE30sr/nwQqJVKTDBY9gzytI:RFaUMSD4bGesUKGZ3JDnXAXvTtY95
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1