General
-
Target
8c01f096725d70248403986433a2052358112499578c1e5ce68b1363709434bd.zip
-
Size
1.7MB
-
Sample
240402-mbd13sfb32
-
MD5
017d801eb0228f288a10086766338d4b
-
SHA1
f791b97ad58cf0e9e6f5944cd660880f25f02642
-
SHA256
61a5f6593f9dc74943f1aa03d0a92297b9c2b6800265af3c5ba8bc67f90f6f33
-
SHA512
6d739247b0a631f5e3af99f28a2290c7683ba0cdc920a18a7509f1ec49dc11dc88840b2bfc28be130dfdab7a982eaa56f8c0a8d445c28cf1f71077d88dbf1c40
-
SSDEEP
49152:3TPQgAc6uFO8rD8FVQbRPn7recWNELrRBn0b9q:3U+hFO8r4zMRPnvXWNKRyY
Static task
static1
Behavioral task
behavioral1
Sample
8c01f096725d70248403986433a2052358112499578c1e5ce68b1363709434bd.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
homed
109.107.182.133:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
8c01f096725d70248403986433a2052358112499578c1e5ce68b1363709434bd.exe
-
Size
1.7MB
-
MD5
c1e80da312a1bd6a1f1aaa161018666c
-
SHA1
32e5f748d2e2cfae1be622e40f311915149416c7
-
SHA256
8c01f096725d70248403986433a2052358112499578c1e5ce68b1363709434bd
-
SHA512
3edf7efe24308d909f9709f281a5121c187d19823784feedc7f5d4ca9c42eb78c9f39ebf3c9c1d58956fd5881f2a230700bc11257f87d395032ab26a35a55552
-
SSDEEP
24576:cykJbJ36Orsbh8qXBxizQmEOUIx7qse9vvyDF4UMuohhDLFmEAfiVReF4EG9HfFs:Lkv36Ouh8qLiEldgYCx4L7YgaEH
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1