General

  • Target

    4838cdebf5296c0c4d1c4feac4fcb3f97b1d7b0899a49a910a7f78fca71aa6ea

  • Size

    166KB

  • Sample

    211008-zbv1taegh8

  • MD5

    d9dab2a5498637070e495083e1fd6158

  • SHA1

    626ddff9625866c9ba2838eebd993e91b2c97398

  • SHA256

    4838cdebf5296c0c4d1c4feac4fcb3f97b1d7b0899a49a910a7f78fca71aa6ea

  • SHA512

    4396c53423e9a10fe4134844d69af7cce54ca5802270faf068113ceacd955c8d1610f80e5a9f2ae5e8acb27ec945ff57683a602d3235a2f3c832dd4eaa667b83

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fazanaharahe10.top/

http://xandelissane20.top/

http://ustiassosale30.top/

http://cytheriata40.top/

http://ggiergionard50.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

777

C2

93.115.20.139:28978

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Extracted

Family

raccoon

Version

1.8.2

Botnet

2ea41939378a473cbe7002fd507389778c0f10e7

Attributes
  • url4cnc

    http://teletop.top/stevuitreen

    http://teleta.top/stevuitreen

    https://t.me/stevuitreen

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

41.2

Botnet

1033

C2

https://mas.to/@serg4325

Attributes
  • profile_id

    1033

Extracted

Family

raccoon

Version

1.8.2

Botnet

8d179b9e611eee525425544ee8c6d77360ab7cd9

Attributes
  • url4cnc

    http://teletop.top/agrybirdsgamerept

    http://teleta.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

MIX7

C2

185.237.165.181:58506

Extracted

Family

raccoon

Version

1.8.2

Botnet

c95bfeb977df680e3fb35c1ce322d091ffdbaf92

Attributes
  • url4cnc

    http://teletop.top/vvhotsummer

    http://teleta.top/vvhotsummer

    https://t.me/vvhotsummer

rc4.plain
rc4.plain

Targets

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

New Service

1
T1050

Scheduled Task

1
T1053

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

4
T1005

Email Collection

2
T1114

Tasks