General
-
Target
f3935b22955ae50d6117ba87916058d9.bin
-
Size
1.4MB
-
Sample
231113-ecq32agg2w
-
MD5
d94ee6423a867ec9231ab77ac55d13c2
-
SHA1
f729fe5137e76ee7bbb8895ab1e02b48c444c8ad
-
SHA256
234bf45368d98243b625cf1c69ba15213ceae7e8c20f2ab105e52633f289788d
-
SHA512
91c280162fc845302051fd5d6bdc413737845defc47c5df316e49a0fc3621ce550aedb58b0d9555f8db0428e1fac4d6ca10b4a9e3ea0836843c04a0048a9b6dd
-
SSDEEP
24576:3ymp0U5X2TCAn4bTvu3NkyKOt2yQPMn1hADV/NJkZRc3NzOIcQsjTxYAR:3TQ54O33XzPiRCRUoI1MtfR
Static task
static1
Behavioral task
behavioral1
Sample
77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2.exe
-
Size
1.4MB
-
MD5
f3935b22955ae50d6117ba87916058d9
-
SHA1
f9b6db6e857d4058272d5e4ae669d75c272baf79
-
SHA256
77cb45093ccf067140c55c5c8b7df6c7ce6e77abda5f7b55e1c0da15fcdb4cc2
-
SHA512
1a2a3f19bc3b850b1a5007dda93678371744a5b1bffcc3048e963bc14d4cbd9fb9757c2456f0ea5587f9389f77da2e4d51282387447c1aa6d2d8a95becf93aba
-
SSDEEP
24576:jyG+4yALf5O8Jiw648ejIsGMAGF6cDnnoPjpEdyxkW2CHPCJzRJ226mqFM:2M1R9AeMTVGTCNXxkvvJzRsc
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1