General
-
Target
2676151be486236d8c0b11a106a578a7181c58093f74f9fb56f99d3d4a4d8df4
-
Size
2.4MB
-
Sample
231212-bf8wgaccel
-
MD5
bc24ff3e9fddcacebcb1eb827166c041
-
SHA1
7d29b0d92e4f1c56837f2d0b8c96c0c126dc7f30
-
SHA256
2676151be486236d8c0b11a106a578a7181c58093f74f9fb56f99d3d4a4d8df4
-
SHA512
8bbd0cd274b8f0af438cf0f0e41334757b7d93c34d64b4a48eb15632ec440bcfccd893709a8b468c871a40ca5da1cdebe6c760ac5039bd2cbfa9fe8777622734
-
SSDEEP
49152:lY77g6Es54c4YOgRIPyBzkQPxtTw/tE797qkIKi9:yg6Es5AcWKbPxtctEB7qAi
Static task
static1
Behavioral task
behavioral1
Sample
2676151be486236d8c0b11a106a578a7181c58093f74f9fb56f99d3d4a4d8df4.exe
Resource
win10-20231020-en
Malware Config
Extracted
risepro
193.233.132.51
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
LiveTraffic
77.105.132.87:17066
Extracted
smokeloader
up3
Extracted
redline
@oleh_ps
176.123.7.190:32927
Targets
-
-
Target
2676151be486236d8c0b11a106a578a7181c58093f74f9fb56f99d3d4a4d8df4
-
Size
2.4MB
-
MD5
bc24ff3e9fddcacebcb1eb827166c041
-
SHA1
7d29b0d92e4f1c56837f2d0b8c96c0c126dc7f30
-
SHA256
2676151be486236d8c0b11a106a578a7181c58093f74f9fb56f99d3d4a4d8df4
-
SHA512
8bbd0cd274b8f0af438cf0f0e41334757b7d93c34d64b4a48eb15632ec440bcfccd893709a8b468c871a40ca5da1cdebe6c760ac5039bd2cbfa9fe8777622734
-
SSDEEP
49152:lY77g6Es54c4YOgRIPyBzkQPxtTw/tE797qkIKi9:yg6Es5AcWKbPxtctEB7qAi
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1