General
-
Target
f6ddfe6ccfdb8e052724898e070fdd305c3daee7f2fd8fa16ec0c66610b3445b
-
Size
2.4MB
-
Sample
231212-ahyb3schg3
-
MD5
aac6d05e255b2d1c60c9d9b6e9e4152c
-
SHA1
0bb615fb31726d199dc9d3bf70ae1bc6e6dc2c78
-
SHA256
f6ddfe6ccfdb8e052724898e070fdd305c3daee7f2fd8fa16ec0c66610b3445b
-
SHA512
dca85c57e96ea036dd8d7dfcd6009bde1dddd1d57fd827881a7c0a29671d646ecfedebb478f512e64308fc07aaca968fb7e4b1ce3a70d698c5584842446f8e60
-
SSDEEP
49152:ZVk+bZdxFVssG+/4/iVbO1uZsvdZu65w41Lg/KiLICEBOsY:vbFjssR/LVpsvdMgw41hiLn
Static task
static1
Behavioral task
behavioral1
Sample
f6ddfe6ccfdb8e052724898e070fdd305c3daee7f2fd8fa16ec0c66610b3445b.exe
Resource
win10-20231023-en
Malware Config
Extracted
risepro
193.233.132.51
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
@oleh_ps
176.123.7.190:32927
Targets
-
-
Target
f6ddfe6ccfdb8e052724898e070fdd305c3daee7f2fd8fa16ec0c66610b3445b
-
Size
2.4MB
-
MD5
aac6d05e255b2d1c60c9d9b6e9e4152c
-
SHA1
0bb615fb31726d199dc9d3bf70ae1bc6e6dc2c78
-
SHA256
f6ddfe6ccfdb8e052724898e070fdd305c3daee7f2fd8fa16ec0c66610b3445b
-
SHA512
dca85c57e96ea036dd8d7dfcd6009bde1dddd1d57fd827881a7c0a29671d646ecfedebb478f512e64308fc07aaca968fb7e4b1ce3a70d698c5584842446f8e60
-
SSDEEP
49152:ZVk+bZdxFVssG+/4/iVbO1uZsvdZu65w41Lg/KiLICEBOsY:vbFjssR/LVpsvdMgw41hiLn
-
Detect ZGRat V1
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1