General
-
Target
9aeb28e4d246415a276cb32260349d6308d9ce882a1bd09aa460ec54bbb9c655
-
Size
258KB
-
Sample
231127-t1msvahg94
-
MD5
67883b9edc2b6f788d04640c175ce311
-
SHA1
23ac3992c14fffa4eac9452fb3704f7599266860
-
SHA256
9aeb28e4d246415a276cb32260349d6308d9ce882a1bd09aa460ec54bbb9c655
-
SHA512
05e7317fbc948502fbba7b7027a127eff72d9e82446fd30bcd00702e27336e35200d8243b139bf31e8cd3abde832fe15a1109b08f347d49d780c850cd44caff0
-
SSDEEP
6144:YFzo64/3Wj+Lx4tX8HTuL8i7QB8A6VBc:YWZi+LCmEQoVq
Static task
static1
Behavioral task
behavioral1
Sample
9aeb28e4d246415a276cb32260349d6308d9ce882a1bd09aa460ec54bbb9c655.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
95.214.26.17:24714
Extracted
smokeloader
summ
Extracted
smokeloader
pub1
Targets
-
-
Target
9aeb28e4d246415a276cb32260349d6308d9ce882a1bd09aa460ec54bbb9c655
-
Size
258KB
-
MD5
67883b9edc2b6f788d04640c175ce311
-
SHA1
23ac3992c14fffa4eac9452fb3704f7599266860
-
SHA256
9aeb28e4d246415a276cb32260349d6308d9ce882a1bd09aa460ec54bbb9c655
-
SHA512
05e7317fbc948502fbba7b7027a127eff72d9e82446fd30bcd00702e27336e35200d8243b139bf31e8cd3abde832fe15a1109b08f347d49d780c850cd44caff0
-
SSDEEP
6144:YFzo64/3Wj+Lx4tX8HTuL8i7QB8A6VBc:YWZi+LCmEQoVq
-
Raccoon Stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-