General

  • Target

    a165c117afe6f964159910a56a637710a97bc05aea164ae7bdef5a81d7039148

  • Size

    271KB

  • Sample

    230302-t244hsdd2z

  • MD5

    4bd719b7ddb05353769c60c607cfa194

  • SHA1

    55770068f74073430b8381961b85570c9a00437d

  • SHA256

    a165c117afe6f964159910a56a637710a97bc05aea164ae7bdef5a81d7039148

  • SHA512

    0e52541240f0607c1ad27ea6ca79fd931823506df40914cbad2b25ac93c49daa96ad1433725ca74e59e73e73f23589111fefcc3100fc9c80f7a1271d6d2f3816

  • SSDEEP

    3072:LJG8VZLsZuOd6Vr/a6RyjJJ13Ds2GJlEnFnBO4xLVupJFDqncN50mDnUcR:1VZLmuOd8QlXwNEnO4xLV5nE0m5

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

amadey

Version

3.67

C2

193.233.20.14/BR54nmB3/index.php

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Targets

    • Target

      a165c117afe6f964159910a56a637710a97bc05aea164ae7bdef5a81d7039148

    • Size

      271KB

    • MD5

      4bd719b7ddb05353769c60c607cfa194

    • SHA1

      55770068f74073430b8381961b85570c9a00437d

    • SHA256

      a165c117afe6f964159910a56a637710a97bc05aea164ae7bdef5a81d7039148

    • SHA512

      0e52541240f0607c1ad27ea6ca79fd931823506df40914cbad2b25ac93c49daa96ad1433725ca74e59e73e73f23589111fefcc3100fc9c80f7a1271d6d2f3816

    • SSDEEP

      3072:LJG8VZLsZuOd6Vr/a6RyjJJ13Ds2GJlEnFnBO4xLVupJFDqncN50mDnUcR:1VZLmuOd8QlXwNEnO4xLV5nE0m5

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Smokeloader packer

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks