General

  • Target

    ec58cc2b34db12d3887ccfa627921eb6aa4814c048d6f39a88726330da59214a

  • Size

    337KB

  • Sample

    211024-31t2lagchl

  • MD5

    a3aa7d57712e85772071f9f42e34e59b

  • SHA1

    b7d9182748548859097ae346f361c0d80ecc9a29

  • SHA256

    ec58cc2b34db12d3887ccfa627921eb6aa4814c048d6f39a88726330da59214a

  • SHA512

    403240d032f8e412ad598521d9486c8610226cfd6b8f0453b2b9eee6f7900415933de1f91ab45fc24c9ef6719d78cb594b9fc8ddb2ad5320038639a71def9827

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      ec58cc2b34db12d3887ccfa627921eb6aa4814c048d6f39a88726330da59214a

    • Size

      337KB

    • MD5

      a3aa7d57712e85772071f9f42e34e59b

    • SHA1

      b7d9182748548859097ae346f361c0d80ecc9a29

    • SHA256

      ec58cc2b34db12d3887ccfa627921eb6aa4814c048d6f39a88726330da59214a

    • SHA512

      403240d032f8e412ad598521d9486c8610226cfd6b8f0453b2b9eee6f7900415933de1f91ab45fc24c9ef6719d78cb594b9fc8ddb2ad5320038639a71def9827

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks