General
-
Target
ad49dd256adedfa2be9188ec3f68cb75.exe
-
Size
1.6MB
-
Sample
231211-ebmdfsddd7
-
MD5
ad49dd256adedfa2be9188ec3f68cb75
-
SHA1
fe2b02b3d63339ca976759c0e450f82c288b8f3b
-
SHA256
78dd9812c391c45f55ae45735371b6ac7d9f84aba107da824895be3b1d3250e1
-
SHA512
d20c1b37e4ae6fe1cf0451037192299939beabfa9eebf1d103481370a7c730d843d2ec3eae0483e6dfa27bd088d6d1f9539b033ea0f82d7379723ea245d622fc
-
SSDEEP
49152:BTouQ/MlgHcg1OeuDBLWoaOlJgbJrypAgLWnl:xouQ/olWglwrDJl
Static task
static1
Behavioral task
behavioral1
Sample
ad49dd256adedfa2be9188ec3f68cb75.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
ad49dd256adedfa2be9188ec3f68cb75.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
risepro
193.233.132.51
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
LiveTraffic
77.105.132.87:6731
Extracted
redline
@oleh_ps
176.123.7.190:32927
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
ad49dd256adedfa2be9188ec3f68cb75.exe
-
Size
1.6MB
-
MD5
ad49dd256adedfa2be9188ec3f68cb75
-
SHA1
fe2b02b3d63339ca976759c0e450f82c288b8f3b
-
SHA256
78dd9812c391c45f55ae45735371b6ac7d9f84aba107da824895be3b1d3250e1
-
SHA512
d20c1b37e4ae6fe1cf0451037192299939beabfa9eebf1d103481370a7c730d843d2ec3eae0483e6dfa27bd088d6d1f9539b033ea0f82d7379723ea245d622fc
-
SSDEEP
49152:BTouQ/MlgHcg1OeuDBLWoaOlJgbJrypAgLWnl:xouQ/olWglwrDJl
-
Glupteba payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1