General

  • Target

    fe19ca0e7a58af76deaf8136a332980d.exe

  • Size

    260KB

  • Sample

    211004-tfnjmsgfa4

  • MD5

    fe19ca0e7a58af76deaf8136a332980d

  • SHA1

    eb2db73c1d1a491c40b117c2cebda8487459d069

  • SHA256

    a6e58febc0ae0db669343c61e926780b5c6c121aff886c8d5401ac5740025c45

  • SHA512

    5450eebfa571e2b32b7a9f587cc2fbec9fdb9f0bd71591d34126e3e09015180afb4789d830fd2359a252578ef5963ae15e673e28905cb2bd0acb02b334726696

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fiskahlilian16.top/

http://paishancho17.top/

http://ydiannetter18.top/

http://azarehanelle19.top/

http://quericeriant20.top/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

Huntington Bank

C2

34.94.44.44:45181

Extracted

Family

redline

Botnet

@big_tastyyy

C2

87.251.71.44:80

Extracted

Family

raccoon

Botnet

61491ed5436f034714f70beac9b11914bfa969d2

Attributes
  • url4cnc

    https://t.me/hdmiprapor

rc4.plain
rc4.plain

Targets

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks