General
-
Target
NEAS.ec63c477fa21d8b2226296aa77db1030.exe
-
Size
1.0MB
-
Sample
231113-ezzzfshb5y
-
MD5
ec63c477fa21d8b2226296aa77db1030
-
SHA1
f489b751dd16a6884df9ddda285034fea7d67e85
-
SHA256
b830ed49662218ce0830fdd8018ef7730ff47a725c68c792b1199fad6f0a96db
-
SHA512
149c9bc6b62c8ebb39c3ebd304361ee75dc52a7545d6e51c435e19d9c7ba1cb858feda7d9d0e541e42f6deea6b813303c59c4d48ecd22fa5badbb16c6fdad1d2
-
SSDEEP
24576:IycYxxA18gQnaeqIsgCpGykrDo0xT94HpoUc9RBc:PcGYiaexnoGD/mXc9
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ec63c477fa21d8b2226296aa77db1030.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.ec63c477fa21d8b2226296aa77db1030.exe
-
Size
1.0MB
-
MD5
ec63c477fa21d8b2226296aa77db1030
-
SHA1
f489b751dd16a6884df9ddda285034fea7d67e85
-
SHA256
b830ed49662218ce0830fdd8018ef7730ff47a725c68c792b1199fad6f0a96db
-
SHA512
149c9bc6b62c8ebb39c3ebd304361ee75dc52a7545d6e51c435e19d9c7ba1cb858feda7d9d0e541e42f6deea6b813303c59c4d48ecd22fa5badbb16c6fdad1d2
-
SSDEEP
24576:IycYxxA18gQnaeqIsgCpGykrDo0xT94HpoUc9RBc:PcGYiaexnoGD/mXc9
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Stops running service(s)
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1