General
-
Target
531292f4b404a53a700330fa4d622d80b3b72ca2c2f525d7fe0009381fb471c0
-
Size
260KB
-
Sample
240121-19z8vsbee9
-
MD5
458210ef2582bca66b0afd0f218cfabe
-
SHA1
84380de56730f62f60c3b45d91e7434664e57b04
-
SHA256
531292f4b404a53a700330fa4d622d80b3b72ca2c2f525d7fe0009381fb471c0
-
SHA512
a21b1bb648a0a230aa156c2f90b4b465e128b20da79b47cc6b7f98abe7e20084fd502a1790b6ed2e37e3974413e0b75edd44b3f9491c4f2c97b1062be0b0da42
-
SSDEEP
3072:xkhue6/cSz90u2DEJClClQoyLZrs+f6hMCgin21DX7QfrehPY7IQPJUtw+h0j:xkh/BEQ0SBs+f6/gnEre5YEQRE2
Static task
static1
Behavioral task
behavioral1
Sample
531292f4b404a53a700330fa4d622d80b3b72ca2c2f525d7fe0009381fb471c0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
531292f4b404a53a700330fa4d622d80b3b72ca2c2f525d7fe0009381fb471c0.exe
Resource
win10-20231215-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
45.15.156.60:12050
Extracted
asyncrat
0.5.8
Default
91.92.248.67:6606
91.92.248.67:7707
91.92.248.67:8808
MOgiiF6Liim5
-
delay
3
-
install
false
-
install_file
temp.exe
-
install_folder
%AppData%
Extracted
redline
ST12
185.172.128.33:38294
Extracted
risepro
193.233.132.62:50500
Extracted
amadey
4.17
http://185.196.10.34
-
install_dir
eff1401c19
-
install_file
Dctooux.exe
-
strings_key
6e23b5eadc27bb0b2eaebdd4fed1beb2
-
url_paths
/b8sdjsdkS/index.php
Targets
-
-
Target
531292f4b404a53a700330fa4d622d80b3b72ca2c2f525d7fe0009381fb471c0
-
Size
260KB
-
MD5
458210ef2582bca66b0afd0f218cfabe
-
SHA1
84380de56730f62f60c3b45d91e7434664e57b04
-
SHA256
531292f4b404a53a700330fa4d622d80b3b72ca2c2f525d7fe0009381fb471c0
-
SHA512
a21b1bb648a0a230aa156c2f90b4b465e128b20da79b47cc6b7f98abe7e20084fd502a1790b6ed2e37e3974413e0b75edd44b3f9491c4f2c97b1062be0b0da42
-
SSDEEP
3072:xkhue6/cSz90u2DEJClClQoyLZrs+f6hMCgin21DX7QfrehPY7IQPJUtw+h0j:xkh/BEQ0SBs+f6/gnEre5YEQRE2
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
LoaderBot executable
-
Downloads MZ/PE file
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1