General
-
Target
64536e88e6368a45f22adf85b60952d67a425a6b485efc7dc2040818ecfad7ca
-
Size
1.4MB
-
Sample
231113-bvlz9afe86
-
MD5
4fb665f929ad879cb2b410bb3feb0cf7
-
SHA1
f3f7661f710ce6de78548113fecc566f34efc822
-
SHA256
64536e88e6368a45f22adf85b60952d67a425a6b485efc7dc2040818ecfad7ca
-
SHA512
92e303a3e04a122d1146578df284e831ab415e55ebaf019ed696975b1c77b507230dc5e1d4f0cfdaab7ba6fb4ff0ba2a0e5ef6d117e130536b49b13fdbc4783d
-
SSDEEP
24576:4y0aC9Q5iC9DkUgjOXv1eGIsQ8uGezDDxvKziZsCyZ0dsCS5G8eYCPc7RXLJH7R:/0a1hgkte1N5G2VKuZnyGqLG9YCPKXtH
Static task
static1
Behavioral task
behavioral1
Sample
64536e88e6368a45f22adf85b60952d67a425a6b485efc7dc2040818ecfad7ca.exe
Resource
win10-20231023-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
up3
Targets
-
-
Target
64536e88e6368a45f22adf85b60952d67a425a6b485efc7dc2040818ecfad7ca
-
Size
1.4MB
-
MD5
4fb665f929ad879cb2b410bb3feb0cf7
-
SHA1
f3f7661f710ce6de78548113fecc566f34efc822
-
SHA256
64536e88e6368a45f22adf85b60952d67a425a6b485efc7dc2040818ecfad7ca
-
SHA512
92e303a3e04a122d1146578df284e831ab415e55ebaf019ed696975b1c77b507230dc5e1d4f0cfdaab7ba6fb4ff0ba2a0e5ef6d117e130536b49b13fdbc4783d
-
SSDEEP
24576:4y0aC9Q5iC9DkUgjOXv1eGIsQ8uGezDDxvKziZsCyZ0dsCS5G8eYCPc7RXLJH7R:/0a1hgkte1N5G2VKuZnyGqLG9YCPKXtH
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-