General
-
Target
NEAS.7a48d963ada853928dc397b675524c80.exe
-
Size
782KB
-
Sample
231117-a9nxqadf4s
-
MD5
7a48d963ada853928dc397b675524c80
-
SHA1
2e43ddb9ed98613897fabe1c98d422cc26fb4356
-
SHA256
0167af3f120aee09e6d7509239916d0cad2fb9b6d182c5e8649b04978a485026
-
SHA512
1e4621d85a7f0c4c606d8e3721044080d87f46ed6ba2149eb2ff97842b1135ee6b17a51d7cce743ef8d3fd4c898f9411c3626acfb86d86697787a2face75a9bb
-
SSDEEP
12288:CMrvy90c6PEfv0NldHGtaex4IC5upCPHG8+PLvTMXiYQvD4PlR1Ml/pLyB:JyT6PQe5gaeuIsKC/GdLYDB1MTS
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7a48d963ada853928dc397b675524c80.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Targets
-
-
Target
NEAS.7a48d963ada853928dc397b675524c80.exe
-
Size
782KB
-
MD5
7a48d963ada853928dc397b675524c80
-
SHA1
2e43ddb9ed98613897fabe1c98d422cc26fb4356
-
SHA256
0167af3f120aee09e6d7509239916d0cad2fb9b6d182c5e8649b04978a485026
-
SHA512
1e4621d85a7f0c4c606d8e3721044080d87f46ed6ba2149eb2ff97842b1135ee6b17a51d7cce743ef8d3fd4c898f9411c3626acfb86d86697787a2face75a9bb
-
SSDEEP
12288:CMrvy90c6PEfv0NldHGtaex4IC5upCPHG8+PLvTMXiYQvD4PlR1Ml/pLyB:JyT6PQe5gaeuIsKC/GdLYDB1MTS
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1