General
-
Target
6d82e3c5ac60406d1c6a513d7ba1080c77adb32ca3d6b2473e0b6ff76b4818bd.zip
-
Size
1.7MB
-
Sample
240402-mbc4safb26
-
MD5
664136837152adc0da9f2808b70330ab
-
SHA1
4539e3ce7e0de208dd4f62da1b3908d3d823cb2d
-
SHA256
9529d17824dfb901a40ce7e2bde05e3d78e0203b277289d397fb26370ed6a15f
-
SHA512
8ec93caa83c4dcfc94b2a756efa27db6b4c36616a1c9546fc7409f5c474b43009bf5b3a2852f31ed4740a6d9e90da60ea25a79254b78e19b8417dd4f6c5e02c5
-
SSDEEP
49152:SgND+aTkq/ifLJVEnmohISyGv6QnHyKcxLNByasfULS:SgpGcuSnmojyNQ7iNqAS
Static task
static1
Behavioral task
behavioral1
Sample
6d82e3c5ac60406d1c6a513d7ba1080c77adb32ca3d6b2473e0b6ff76b4818bd.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
homed
109.107.182.133:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
6d82e3c5ac60406d1c6a513d7ba1080c77adb32ca3d6b2473e0b6ff76b4818bd.exe
-
Size
1.8MB
-
MD5
41a7fe217d400d78ec38420cfb3875ee
-
SHA1
5cae6714e0cc19819e0c70459a3c25968ec554ff
-
SHA256
6d82e3c5ac60406d1c6a513d7ba1080c77adb32ca3d6b2473e0b6ff76b4818bd
-
SHA512
f602730c3f65b415f06cf67aba5df031deaf8740bad21b4f84ea0e3573ee4d537fb3fdb66491659d2433c4606665e7f7124f12a260356dbe52397be170da93bd
-
SSDEEP
49152:K+0fsuP1/cLYWp/pS3A9YrkbhSsK2J//1:dHuq5/9Yr4hSBi
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1