General

  • Target

    04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f.zip

  • Size

    888KB

  • Sample

    240402-l7ertaeg29

  • MD5

    2353eb8715c39c62d03bfc1ae4e09738

  • SHA1

    c69de1df9540f64a7e88263bb70b0e7ab0f25bdb

  • SHA256

    270f93d55dc5666aae0c62c0ed23b6ce1f747ef57863d0adf577e20b2b180b48

  • SHA512

    06c8fe4f3e195060dfeff9d42d9f14ec7ea4167b3868e633652187369b613224ef1acb7b8376c072a4fc0aa096349440aad6fac0a3aa3317abbe71949d6cb1ad

  • SSDEEP

    24576:TupaQLQfIS62lW9TVU6fFAz5XxHvEdhuD+PWA:TwNHx2lW/UX5Xx8dUD+PB

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Targets

    • Target

      04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f.exe

    • Size

      931KB

    • MD5

      d534bccd65f4d7cb7e7a00809fec8732

    • SHA1

      bd88bd428b8f9f5fb6ecb7e76b8323b94faa745d

    • SHA256

      04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f

    • SHA512

      317581f76534d28b40095f49beb6a8fa42734da6cf939ecfd4363f24d94da782a08bcd64869adae11dec46003a5c3b46e23dc1c1c6708e621f250f13aa7c7e52

    • SSDEEP

      24576:ryvJJkCTQHmXNqP2T1YrBicnyBaG6+IyM1fAIv7Eo:eYmdqP2irBicX+IL1ftv

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks