General
-
Target
0f2ec50da0186e99fb0bf47053b56921.exe
-
Size
37KB
-
Sample
231224-dppkasggd8
-
MD5
0f2ec50da0186e99fb0bf47053b56921
-
SHA1
765f74d96599e8970078d307808e49e8d694a98e
-
SHA256
121b10b4f31da4ecba0a8745a31cb57300982e45310454e8232912ed2afc4248
-
SHA512
ee80fe5bc05c811c9cd1e7af8c13bf3e8c93c322e6eade57e068ea3ee5d69e13d620a43380e60753823167ddf2a01a9019b2a7a324de93aec7f17abe097f3b1c
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
Behavioral task
behavioral1
Sample
0f2ec50da0186e99fb0bf47053b56921.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f2ec50da0186e99fb0bf47053b56921.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
amadey
4.13
http://5.42.65.125
-
install_dir
0de90fc5c7
-
install_file
Utsysc.exe
-
strings_key
b34dd8f60e55add4645c4650cc7f7e7e
-
url_paths
/k92lsA3dpb/index.php
Extracted
redline
LiveTraffic
77.105.132.87:22221
Extracted
lumma
http://soupinterestoe.fun/api
Extracted
redline
666
195.20.16.103:18305
Targets
-
-
Target
0f2ec50da0186e99fb0bf47053b56921.exe
-
Size
37KB
-
MD5
0f2ec50da0186e99fb0bf47053b56921
-
SHA1
765f74d96599e8970078d307808e49e8d694a98e
-
SHA256
121b10b4f31da4ecba0a8745a31cb57300982e45310454e8232912ed2afc4248
-
SHA512
ee80fe5bc05c811c9cd1e7af8c13bf3e8c93c322e6eade57e068ea3ee5d69e13d620a43380e60753823167ddf2a01a9019b2a7a324de93aec7f17abe097f3b1c
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
-
Detect Lumma Stealer payload V4
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-