General
-
Target
cada589a1b8763787f2627812a48a9aa6fde564f63ef17de71927af34cf96c2d
-
Size
1.4MB
-
Sample
240308-yw7dxafa99
-
MD5
3e62b1ff32a4ada59b3dc95b0257bc24
-
SHA1
692135b1aa72282b6fd405fe4b8cd90ef2532f94
-
SHA256
cada589a1b8763787f2627812a48a9aa6fde564f63ef17de71927af34cf96c2d
-
SHA512
bc6428056204a6ffc5632b07614b48fad4cdf66fc769303757e8a466c722d3bb5e808f58ba82c5541f490b032454f82d0ba802851ed69a1a6f0cf7547bbf351f
-
SSDEEP
24576:yyW03Kg4GLQvrveaIsXxYGmy1DMWKnc4TJyfsd76yfNARB9kSgrit/lK:ZWDgL+Dehq6GnIJTkfsh6yfNAf0iRl
Static task
static1
Behavioral task
behavioral1
Sample
cada589a1b8763787f2627812a48a9aa6fde564f63ef17de71927af34cf96c2d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
cada589a1b8763787f2627812a48a9aa6fde564f63ef17de71927af34cf96c2d
-
Size
1.4MB
-
MD5
3e62b1ff32a4ada59b3dc95b0257bc24
-
SHA1
692135b1aa72282b6fd405fe4b8cd90ef2532f94
-
SHA256
cada589a1b8763787f2627812a48a9aa6fde564f63ef17de71927af34cf96c2d
-
SHA512
bc6428056204a6ffc5632b07614b48fad4cdf66fc769303757e8a466c722d3bb5e808f58ba82c5541f490b032454f82d0ba802851ed69a1a6f0cf7547bbf351f
-
SSDEEP
24576:yyW03Kg4GLQvrveaIsXxYGmy1DMWKnc4TJyfsd76yfNARB9kSgrit/lK:ZWDgL+Dehq6GnIJTkfsh6yfNAf0iRl
-
Detect Lumma Stealer payload V4
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-