General
-
Target
a0d29dafb35b329c6f2d22f3df7d867b758ab2cc6194b0a3e0351d54c351ed1d
-
Size
1.4MB
-
Sample
231112-wf7cvsad53
-
MD5
0c5ac090ed5ee388bf175101b3cf09c3
-
SHA1
18e5fb2ca81ba073fafa58dce72c669187e66865
-
SHA256
a0d29dafb35b329c6f2d22f3df7d867b758ab2cc6194b0a3e0351d54c351ed1d
-
SHA512
069f47d628adf61a9b8bb78c9a658a865b292c229642bb28429d661d75a70cc177542d7623c838df6d429efd813162805378363debbc2b12c26cfc8d24de76d8
-
SSDEEP
24576:9yoOaFNxeyetIs/5OGMgSDw4TJJduGFBbvxLVaBwAbVm2dgVqtMD:YxSNfeey4G8RTJH1TLwr
Static task
static1
Behavioral task
behavioral1
Sample
a0d29dafb35b329c6f2d22f3df7d867b758ab2cc6194b0a3e0351d54c351ed1d.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
a0d29dafb35b329c6f2d22f3df7d867b758ab2cc6194b0a3e0351d54c351ed1d
-
Size
1.4MB
-
MD5
0c5ac090ed5ee388bf175101b3cf09c3
-
SHA1
18e5fb2ca81ba073fafa58dce72c669187e66865
-
SHA256
a0d29dafb35b329c6f2d22f3df7d867b758ab2cc6194b0a3e0351d54c351ed1d
-
SHA512
069f47d628adf61a9b8bb78c9a658a865b292c229642bb28429d661d75a70cc177542d7623c838df6d429efd813162805378363debbc2b12c26cfc8d24de76d8
-
SSDEEP
24576:9yoOaFNxeyetIs/5OGMgSDw4TJJduGFBbvxLVaBwAbVm2dgVqtMD:YxSNfeey4G8RTJH1TLwr
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1