General

  • Target

    6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.zip

  • Size

    988KB

  • Sample

    240402-l7g7yaeg43

  • MD5

    d88eab2789f3e4a7afa381ca99f21c93

  • SHA1

    c3fef5f38a790d5cde01a115bce35a8b478d10ac

  • SHA256

    0cc4274cd2f1ffb018b575599b9130d19ab4af75f63ce1644675e75a668a0c1f

  • SHA512

    09c91ac905b9dcab89762aea4bc22376450cc50c898d398fda2bb13f0939c83773801d05aef8c93f4aee6cf8fcc82cf3eb89b2409ca8e2082f1482cbbd4d8c59

  • SSDEEP

    24576:LhGIR8PKMfDCdhQyVIHsbUS6DjW0mmuc9pxVtTaqMA:NzoKWCktHsbUS69/5Ta0

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Targets

    • Target

      6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe

    • Size

      1.0MB

    • MD5

      0fc9cee6808909feddf5c8e4e30c7abb

    • SHA1

      e7498be8807c91714ebcd30d698e3ea0670ef6cb

    • SHA256

      6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4

    • SHA512

      80eb9a7ec6826b949b76d5e24200418647e86fecf6144900e900983f50c6502fc32fc1d90b577e27dab7ed2f2e6625ec6326f690c4ab17905ac46b2469b46353

    • SSDEEP

      24576:8ygbPFjq6/rtm4RLWdXuFFFymJ5throrhUniYRHA:rgbPRq6ztxS0b/vrDnBR

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks