General
-
Target
601ea83a4a3b3ba5037c8185d1b8f521091a9bcc2a1676c6e047518405c91d58.zip
-
Size
1.5MB
-
Sample
240402-mpl9lsfc91
-
MD5
3fe84f3d0eb1007594c78c80210e7e6f
-
SHA1
428a47fb84bcd388394c158adaf299b339dd2aaf
-
SHA256
0e38ebe84acc782041ad2675645ceff5d48a59ee8b56ae99945beb91252f12bb
-
SHA512
250f3807ca0d1bce82a818cd5c79407c968ae5d7d32b0a70f6409dc695679113f6b248ad5f87fe98497afbf38a8cc029bd60b6cd3f02a6be0c9f14ee5ba3e027
-
SSDEEP
49152:J9hMo9gdqoqTZdJBI/eHkm2ciwEdoIQQLcvBDSvG:J9D9SqTz3I2Hkm2bwE2ITcvxUG
Static task
static1
Behavioral task
behavioral1
Sample
601ea83a4a3b3ba5037c8185d1b8f521091a9bcc2a1676c6e047518405c91d58.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Targets
-
-
Target
601ea83a4a3b3ba5037c8185d1b8f521091a9bcc2a1676c6e047518405c91d58.exe
-
Size
1.6MB
-
MD5
4134fbef26ed612d274c2beeb721b0b6
-
SHA1
4b7add665f3246c6107d65692a9f6145a1aa579f
-
SHA256
601ea83a4a3b3ba5037c8185d1b8f521091a9bcc2a1676c6e047518405c91d58
-
SHA512
a33d0f9c32ed55a708a28b891d7a5761b17257afbbeecd3cd5702c6ec6ba920d56e9414da282bfda8f7ea20fde0cdb38fe9083167f96da48877bce5c4ec1d668
-
SSDEEP
49152:IMkxML0hUMN3069F5Ienkh8kFOx7P+JskQaCeUvej:7bUU0NIekh8kF8IQZ
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1