General

  • Target

    0f7fea936ac9aaf62528ed30373c838d

  • Size

    290KB

  • Sample

    211016-peyk1abhh7

  • MD5

    0f7fea936ac9aaf62528ed30373c838d

  • SHA1

    262413c6eee91c797806be1a22394036bf84b633

  • SHA256

    ee6cb977e78651d7b9a3fd412a40f6e2cd1501f05b04c49e744db35c83181132

  • SHA512

    a56c15fc8e293d00dff30918e3adcee5d66ef2182a5ed1cd9f176dd6fa37a9c7e401cd2490aac4f2cfda35b17099f1ade03efb0276b984cf6b359bf24b41baec

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://honawey7.top/

http://wijibui0.top/

http://hefahei6.top/

http://pipevai4.top/

http://nalirou7.top/

http://gfdjgdfjgdhfbg.space/

http://gfhjdsghdfjg23.space/

http://gdfjgdfh4543nf.space/

http://fgdjgsdfghj4fds.space/

http://fgdgdjfgfdgdf.space/

http://fsdhjfsdhfsd.space/

http://fgdsjghdfghjdfhgd.space/

http://ryuesrseyth3.space/

http://fdsjkuhreyu4.space/

http://fdgjdfgehr4.space/

http://fgdgjhdfgdfjgd.space/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

2e56d61c5f4b4a46cd452a288b45013a8ce55afa

Attributes
  • url4cnc

    http://telegatt.top/vvhotsummer

    http://telegka.top/vvhotsummer

    http://telegin.top/vvhotsummer

    https://t.me/vvhotsummer

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

rahim

C2

139.99.118.252:12517

Extracted

Family

vidar

Version

41.4

Botnet

936

C2

https://mas.to/@sslam

Attributes
  • profile_id

    936

Extracted

Family

redline

Botnet

testmixNEW

C2

185.215.113.17:9054

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

raccoon

Botnet

3dde9cf1ea25ec8623cf240fe8d23e8d3fe465f0

Attributes
  • url4cnc

    http://telegatt.top/d1rolsavage

    http://telegka.top/d1rolsavage

    http://telegin.top/d1rolsavage

    https://t.me/d1rolsavage

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

office365log and wallet

C2

185.215.113.102:10007

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

3
T1089

Modify Registry

4
T1112

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks