General

  • Target

    490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4

  • Size

    337KB

  • Sample

    211024-159xhafcg5

  • MD5

    8c4d48766b81eccc3dc62fe27430ef5a

  • SHA1

    d4cfbfa0e66a56574133d1dcf20c2f4d47264028

  • SHA256

    490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4

  • SHA512

    56eac1b98836e7543948dc13edaf11cd2d3898864569e6d77ebd32fe7d3fb0758b44c5ee26339f31a99da476a8bf9527012464d3f73486ced47929dfe1004301

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

raccoon

Botnet

ba336408351e2076c6ec5c422139f38a44d0691f

Attributes
  • url4cnc

    http://telegin.top/jjbadb0y

    http://ttmirror.top/jjbadb0y

    http://teletele.top/jjbadb0y

    http://telegalive.top/jjbadb0y

    http://toptelete.top/jjbadb0y

    http://telegraf.top/jjbadb0y

    https://t.me/jjbadb0y

rc4.plain
rc4.plain

Targets

    • Target

      490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4

    • Size

      337KB

    • MD5

      8c4d48766b81eccc3dc62fe27430ef5a

    • SHA1

      d4cfbfa0e66a56574133d1dcf20c2f4d47264028

    • SHA256

      490142b800459586d6861c710615c037a7415efe573dfdadb01153c04b5650f4

    • SHA512

      56eac1b98836e7543948dc13edaf11cd2d3898864569e6d77ebd32fe7d3fb0758b44c5ee26339f31a99da476a8bf9527012464d3f73486ced47929dfe1004301

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks