General
-
Target
b6495a9c6a890740db6f41bf37af8427.bin
-
Size
27KB
-
Sample
231220-dq98dscgg7
-
MD5
f8dec2a4457c44910844eef8f8eb3f2d
-
SHA1
8f2da1c5dfdac21ed0734bac0a83bfd71d2361bf
-
SHA256
750541e3c02cdea8ed3796f5d16bf1ed748597433f6ac1d8cec02ee0392b13ec
-
SHA512
13f807e4391b8e7d31023c2ecc48026287381d8e9a20d145383c32ad69b346dea8a3966818f1133fa240eae957816a6db03f3cd63ad71da7adbcf57d30c87652
-
SSDEEP
768:XHrCwyhFMKf/vHXbO+M+KsAbGRdRsm2epLWjyKflPLdhJ+X:XHuwyhG6HXb5fGGRdzdWjys5hJ+X
Behavioral task
behavioral1
Sample
816640f101b9440dc8892bf84720ac50afe8fe11888574fa8b81af8caae19aa7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
816640f101b9440dc8892bf84720ac50afe8fe11888574fa8b81af8caae19aa7.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
smokeloader
up3
Extracted
redline
@oleh_ps
176.123.7.190:32927
Extracted
stealc
http://77.91.76.36
-
url_path
/3886d2276f6914c4.php
Extracted
redline
LiveTraffic
77.105.132.87:17066
Extracted
redline
666
195.20.16.103:18305
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
816640f101b9440dc8892bf84720ac50afe8fe11888574fa8b81af8caae19aa7.exe
-
Size
36KB
-
MD5
b6495a9c6a890740db6f41bf37af8427
-
SHA1
97eff597d991a62bffc0774952dd9ffb45d7b3f4
-
SHA256
816640f101b9440dc8892bf84720ac50afe8fe11888574fa8b81af8caae19aa7
-
SHA512
63fcbaa890baa84cb9fd8b7f8a016e811e0d5148d1432f10ac3f69637497e1608c4ee03ab6f16637b082ad3d81ff3fa47477c4fb00a8f951a0116477a66881c8
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1