General
-
Target
NEAS.77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2.exe
-
Size
1.4MB
-
Sample
231112-w8vjrsad5y
-
MD5
f3935b22955ae50d6117ba87916058d9
-
SHA1
f9b6db6e857d4058272d5e4ae669d75c272baf79
-
SHA256
77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2
-
SHA512
1a2a3f19bc3b850b1a5007dda93678371744a5b1bffcc3048e963bc14d4cbd9fb9757c2456f0ea5587f9389f77da2e4d51282387447c1aa6d2d8a95becf93aba
-
SSDEEP
24576:jyG+4yALf5O8Jiw648ejIsGMAGF6cDnnoPjpEdyxkW2CHPCJzRJ226mqFM:2M1R9AeMTVGTCNXxkvvJzRsc
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
up3
Targets
-
-
Target
NEAS.77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2.exe
-
Size
1.4MB
-
MD5
f3935b22955ae50d6117ba87916058d9
-
SHA1
f9b6db6e857d4058272d5e4ae669d75c272baf79
-
SHA256
77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2
-
SHA512
1a2a3f19bc3b850b1a5007dda93678371744a5b1bffcc3048e963bc14d4cbd9fb9757c2456f0ea5587f9389f77da2e4d51282387447c1aa6d2d8a95becf93aba
-
SSDEEP
24576:jyG+4yALf5O8Jiw648ejIsGMAGF6cDnnoPjpEdyxkW2CHPCJzRJ226mqFM:2M1R9AeMTVGTCNXxkvvJzRsc
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-