General

  • Target

    b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f

  • Size

    275KB

  • Sample

    230326-ns13lsgd36

  • MD5

    a3977cfffdf7d761f023b079f9112fa2

  • SHA1

    8571c879fbfc226e8317612d1bd2f5e1d5a41f0a

  • SHA256

    b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f

  • SHA512

    0e358d09fdffb9a8c34fecb4a48f56e220b51b094f0a8fa58d5553097843c33b8d711e2cec6e803d20499f8a76ff32eec3cc22e84fe7660fd6bfde02ce255315

  • SSDEEP

    3072:33pUWxKhzuaeyUwCYuk4rbZ6vnrS/CWn2niJKuJbuVqpN/GRpNN4TJY:6Nre7wCkvkCO2iLJaV2N/SNN4T

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://cdn.discordapp.com/attachments/1088825170803834963/1089477660289273897/54353463643.ps1

Extracted

Family

smokeloader

Botnet

sprg

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

W1

C2

45.138.74.246:23202

Attributes
  • auth_value

    610a2c0ff759947b8e0f08aef5e872ca

Extracted

Family

stealc

C2

http://ergrtgrtgwrgrgrgrgwregergerg.cloud/9046019a53d6623�.php

Targets

    • Target

      b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f

    • Size

      275KB

    • MD5

      a3977cfffdf7d761f023b079f9112fa2

    • SHA1

      8571c879fbfc226e8317612d1bd2f5e1d5a41f0a

    • SHA256

      b17247d929c31c0ffcd0606b6fc4cf462da2ab4fd858ffbdfdfad3479a7a145f

    • SHA512

      0e358d09fdffb9a8c34fecb4a48f56e220b51b094f0a8fa58d5553097843c33b8d711e2cec6e803d20499f8a76ff32eec3cc22e84fe7660fd6bfde02ce255315

    • SSDEEP

      3072:33pUWxKhzuaeyUwCYuk4rbZ6vnrS/CWn2niJKuJbuVqpN/GRpNN4TJY:6Nre7wCkvkCO2iLJaV2N/SNN4T

    • Detects Stealc stealer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Stealc

      Stealc is an infostealer written in C++.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks