General

  • Target

    a6430897a63ebda6908bef00def1058f.exe

  • Size

    261KB

  • Sample

    211004-vs5jcsgfg4

  • MD5

    a6430897a63ebda6908bef00def1058f

  • SHA1

    53c444955221a5c741be7a560461828541b35669

  • SHA256

    73f2d6971fac776780e59a33b3f3e4771527c250eaceb3040af59129829ab5e2

  • SHA512

    8996bb4d046631b2f91d616d5ba94f81b4d3d8b6edfde48691ad8e67cff6f1f095ad889afb1779fb2c828c19d15d908aba962962449d9f22ac82f88bf565f5d6

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fiskahlilian16.top/

http://paishancho17.top/

http://ydiannetter18.top/

http://azarehanelle19.top/

http://quericeriant20.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Proliv

C2

93.115.20.139:28978

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

@big_tastyyy

C2

87.251.71.44:80

Targets

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Tasks