General
-
Target
06718ccfd979264c292c63d5803b57a1.exe
-
Size
260KB
-
Sample
231210-28mf2sehhq
-
MD5
06718ccfd979264c292c63d5803b57a1
-
SHA1
7a80a437a3adbd657183613900716f273a6e045d
-
SHA256
3c974b9f0a714df2773f11095f9d1c348c3db7676671346baf6e328d7b42bd1a
-
SHA512
df855b796a569f96c334b1a0b9e4479cfa13779545853fd121777917fc23c029ebfde35639042d12bb96fec0ef383b04ca866d83bbbcf950c74cb62b15cb6a47
-
SSDEEP
3072:NWnpVFrrYIEX6Py1BikhWdwk8tXhMGLcFyeG9ColCw4to6uAg0FujVhOUwApdux+:NUVZI+6iUnJCGLcU8olNAOO+pl
Static task
static1
Behavioral task
behavioral1
Sample
06718ccfd979264c292c63d5803b57a1.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
06718ccfd979264c292c63d5803b57a1.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
LiveTraffic
77.105.132.87:6731
Extracted
redline
@oleh_ps
176.123.7.190:32927
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
eternity
47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q
-
payload_urls
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
Targets
-
-
Target
06718ccfd979264c292c63d5803b57a1.exe
-
Size
260KB
-
MD5
06718ccfd979264c292c63d5803b57a1
-
SHA1
7a80a437a3adbd657183613900716f273a6e045d
-
SHA256
3c974b9f0a714df2773f11095f9d1c348c3db7676671346baf6e328d7b42bd1a
-
SHA512
df855b796a569f96c334b1a0b9e4479cfa13779545853fd121777917fc23c029ebfde35639042d12bb96fec0ef383b04ca866d83bbbcf950c74cb62b15cb6a47
-
SSDEEP
3072:NWnpVFrrYIEX6Py1BikhWdwk8tXhMGLcFyeG9ColCw4to6uAg0FujVhOUwApdux+:NUVZI+6iUnJCGLcU8olNAOO+pl
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1