General

  • Target

    setup_x86_x64_install.exe

  • Size

    6.5MB

  • Sample

    210917-fxkmeshfgq

  • MD5

    591c62c68ce81550a99f07e173a56217

  • SHA1

    4e5d00df20e12a0cc74189eb691e063b3a84990a

  • SHA256

    1eb3574e7faa18d12759034dcc5a26ac90d79badef17cf1a744854d9a9e41cb0

  • SHA512

    71f4068cc19d72251bbb29609d1ff2564228e1050c82006b82e45ac7f868c9e2cae3e738b2d3d30d372f2de4a4e1e52386cc54dede20848af4c92591dadfb4a5

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

medianew

C2

91.121.67.60:62102

Extracted

Family

redline

Botnet

ANI

C2

45.142.215.47:27643

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      setup_x86_x64_install.exe

    • Size

      6.5MB

    • MD5

      591c62c68ce81550a99f07e173a56217

    • SHA1

      4e5d00df20e12a0cc74189eb691e063b3a84990a

    • SHA256

      1eb3574e7faa18d12759034dcc5a26ac90d79badef17cf1a744854d9a9e41cb0

    • SHA512

      71f4068cc19d72251bbb29609d1ff2564228e1050c82006b82e45ac7f868c9e2cae3e738b2d3d30d372f2de4a4e1e52386cc54dede20848af4c92591dadfb4a5

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Permissions Modification

1
T1222

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks