General

  • Target

    inv_112020_65098.pif

  • Size

    656KB

  • Sample

    201123-nn191jmxse

  • MD5

    6e5017e2d0407e74578d1121233da979

  • SHA1

    be9ad4ab667f1e8be4ad4848ad852d5a72aa4234

  • SHA256

    7af038d2f4f41c0d130aaa1e4557d821e2b7f4c6bda2be44300e229cd5c721df

  • SHA512

    b1f8e67c5373aef0e7997d2c4392078aa7f7f28b975fad0e06319a524a59ec98d328fd60438b00f05b6c16b6142065d995e1b88512fdd9e02839990407b15e61

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://penodux.com/xsmkld/index.php

http://tommusikirtyur.com/xsmkld/index.php

http://ploaernysannyer.com/xsmkld/index.php

http://dersmasfannyer.com/xsmkld/index.php

http://derdsgdannyer.com/xsmkld/index.php

rc4.i32
rc4.i32

Extracted

Family

dridex

Botnet

10444

C2

175.126.167.148:443

173.249.20.233:8043

162.241.204.233:4443

138.122.143.40:8043

rc4.plain
rc4.plain

Targets

    • Target

      inv_112020_65098.pif

    • Size

      656KB

    • MD5

      6e5017e2d0407e74578d1121233da979

    • SHA1

      be9ad4ab667f1e8be4ad4848ad852d5a72aa4234

    • SHA256

      7af038d2f4f41c0d130aaa1e4557d821e2b7f4c6bda2be44300e229cd5c721df

    • SHA512

      b1f8e67c5373aef0e7997d2c4392078aa7f7f28b975fad0e06319a524a59ec98d328fd60438b00f05b6c16b6142065d995e1b88512fdd9e02839990407b15e61

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks