General
-
Target
NEAS.16280b24aff31fcadd92c1fd9480c8992c3f2452db9c28f9684ec1f2c4b04526.exe
-
Size
1.4MB
-
Sample
231112-we2qzsad26
-
MD5
f38e27c98c652eb83fffa4c219513aa2
-
SHA1
66e6054665414dad11fd42d4f16027c408c80408
-
SHA256
16280b24aff31fcadd92c1fd9480c8992c3f2452db9c28f9684ec1f2c4b04526
-
SHA512
4246123c69826190e7914615d00ebebea827016047af94bfa0275133549f81c7c790add04efb0ad0393dd85528175219523f670df30c4c7767c32b26e4f426f5
-
SSDEEP
24576:AyeamsHxhWJtIUeMIstyrGzXNDNrA2N8zubNXzi9HJxiF977rkwf4F6:Heam8LW7Ne7KyGpBrA2N82NG9HT4970w
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.16280b24aff31fcadd92c1fd9480c8992c3f2452db9c28f9684ec1f2c4b04526.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.16280b24aff31fcadd92c1fd9480c8992c3f2452db9c28f9684ec1f2c4b04526.exe
-
Size
1.4MB
-
MD5
f38e27c98c652eb83fffa4c219513aa2
-
SHA1
66e6054665414dad11fd42d4f16027c408c80408
-
SHA256
16280b24aff31fcadd92c1fd9480c8992c3f2452db9c28f9684ec1f2c4b04526
-
SHA512
4246123c69826190e7914615d00ebebea827016047af94bfa0275133549f81c7c790add04efb0ad0393dd85528175219523f670df30c4c7767c32b26e4f426f5
-
SSDEEP
24576:AyeamsHxhWJtIUeMIstyrGzXNDNrA2N8zubNXzi9HJxiF977rkwf4F6:Heam8LW7Ne7KyGpBrA2N82NG9HT4970w
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-