General
-
Target
d33d17445df87212813fd8d4d849c66c90ac946e2d3deb9ade08d92c95d40a93.zip
-
Size
835KB
-
Sample
240402-l7kytseg57
-
MD5
a77ddc1e7e10208d0ea64676d34b6723
-
SHA1
56c085bc3e637aa3e48bb96a037ebfabaad89c8a
-
SHA256
4f664c42adf81ba9b3ad736a26f7a72c45d641a4164aabc6062e33f3ba2e62e2
-
SHA512
7fbbc0780288339d7639714e6a5636277a8f08fb40a4a3a704801044fa38ec632ed908a41d960be78b8191f245447e7ebdb5dbfdfbda1eaa8685fd4075270419
-
SSDEEP
24576:82HP6e8EnXBsYIWcmHQEO29T/IHeDSPc+HWOS0C:XCeFKY33BUOhBOSF
Static task
static1
Behavioral task
behavioral1
Sample
d33d17445df87212813fd8d4d849c66c90ac946e2d3deb9ade08d92c95d40a93.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Targets
-
-
Target
d33d17445df87212813fd8d4d849c66c90ac946e2d3deb9ade08d92c95d40a93.exe
-
Size
878KB
-
MD5
042e9ff3eb2884903c304965a6c3fd2e
-
SHA1
d488b60fb1d1f0ada321fbe25554b3d79d95327c
-
SHA256
d33d17445df87212813fd8d4d849c66c90ac946e2d3deb9ade08d92c95d40a93
-
SHA512
e804377f2e5495ec1a4be6d257ebaa67ec269fc13c6436824b36c8ab31e236633c86b699ae8574d96b715d6ee7bd8bafb319387ce527b3546f857351886d4153
-
SSDEEP
24576:byWSFeOSZ0QV/2J4UcTjJjAysYTz5dvqZym2FVKKJ1Ka+:OWCC0QVOaj/Jj1VX5dw2TfB
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1