General
-
Target
b8c4184e57c309b868bcd24bd67890a8549d93b8919ef57d00907bb0769ce7a2.zip
-
Size
834KB
-
Sample
240402-l7kcasec7t
-
MD5
86061df32a538cbca7f6b618646eb85c
-
SHA1
685c2c3d853804abf65e0e0f2c6b2481d04b60ba
-
SHA256
cca6e4355cfdbbd8cbbb95338cbd8fdd72b6bb105b6468e366b69eba4a761b98
-
SHA512
2cbbe76a46baf2c1e2c406f76dc02e5d9717b54733f73dfabd42fd9c7ae8230713442158eb56f3a770c6b8fcd4297d950b1a969d472c821f43329ceeef580d41
-
SSDEEP
24576:INxVwHVmfOzA7//MVcNtyxHPhKUJTuhHWtDI:Iw1zALcewvhhTu2tDI
Static task
static1
Behavioral task
behavioral1
Sample
b8c4184e57c309b868bcd24bd67890a8549d93b8919ef57d00907bb0769ce7a2.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Targets
-
-
Target
b8c4184e57c309b868bcd24bd67890a8549d93b8919ef57d00907bb0769ce7a2.exe
-
Size
878KB
-
MD5
d318c6337d7cad78817bd3b9b3f43bc5
-
SHA1
dbf134d1a4d1d712bd4d917bba0c2545fb5f901d
-
SHA256
b8c4184e57c309b868bcd24bd67890a8549d93b8919ef57d00907bb0769ce7a2
-
SHA512
4b3f8c606d1f33c823c3fa74f560208d951d4591a1fb894de6919eb809ce167fe0e5498eb89c3f3ef4c231580bad8ec5d7bc4bd2f1d0974bcd9571b4bac4a4b0
-
SSDEEP
12288:KMr0y90qyaqD7Ok06pNmgoVKDrk4qKdFagXt0ogWtTlY3tXrGlqFfmef2mglg+x2:GyCdce3DrkaTRgAitbGUR2maXIJp
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1