General

  • Target

    f7928541a6c0301e441e0a2f17b375e6.exe

  • Size

    287KB

  • Sample

    210928-psysxscaa6

  • MD5

    f7928541a6c0301e441e0a2f17b375e6

  • SHA1

    f4489003e0c06e4b9637581d545e27f5be9900f1

  • SHA256

    2ae6703e19002c43074774727b96a0de197208bef65f33b52272ea5327cb586d

  • SHA512

    06f3fb6200e6af05679fdd8a6a113df62c5b20ff714a62ee732766d7cf20c9008ee04673d57370ee77be6b7df71466bf96dc784bc4fd324194ffe4ed5ea7c40b

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

92.246.89.6:38437

Extracted

Family

redline

Botnet

z0rm1onbuild

C2

45.156.21.209:56326

Extracted

Family

raccoon

Botnet

a72c96f6762e4258a13dee8bc0dd14557df18467

Attributes
  • url4cnc

    https://t.me/h_wacel1new_1

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

instashop

C2

185.92.74.142:80

Extracted

Family

raccoon

Botnet

7503ff9128ce04d8aa87f5435101fb3450bd21b8

Attributes
  • url4cnc

    https://t.me/h_royal_1

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

vol4

C2

92.222.145.232:61157

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks